Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
暂无分享,去创建一个
[1] Sohail A Hirani. Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .
[2] Tingyuan Nie,et al. Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.
[3] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[4] Abdur Rahim Choudhary,et al. Securing IPv6 network infrastructure: A new security model , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).
[5] V. Ramaswamy. Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect , 2008 .
[6] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[7] Keshab K. Parhi,et al. Implementation approaches for the Advanced Encryption Standard algorithm , 2002 .
[8] R. N. Uma,et al. Battery power-aware encryption , 2006, TSEC.
[9] Gerald A. Marin. Network Security Basics , 2005, IEEE Secur. Priv..
[10] William Stallings,et al. Cryptography and network security , 1998 .
[11] R. Badlishah Ahmad,et al. Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .
[12] Mohey M. Hadhoud,et al. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..
[13] I. Downnard. Public-key cryptography extensions into Kerberos , 2003 .
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .