Security analysis of blowfish algorithm
暂无分享,去创建一个
[1] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[2] D. Roy Chowdhury,et al. NLFS : A NEW NON-LINEAR FEEDBACK STREAM CIPHER , 2008 .
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Monisha Sharma,et al. Implementation and analysis of various symmetric cryptosystems , 2010 .
[5] Mark Stamp,et al. Information security - principles and practice , 2005 .
[6] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[7] Aly A. Fahmy,et al. A Proposal For A Key-Dependent AES , 2005 .
[8] Obaida Mohammad Awad,et al. NEW CRYPTOGRAPHIC ALGORITHMS FOR ENHANCING SECURITY OF VOICE DATA , 2010 .
[9] Faiz Yousif Mohammad,et al. A Novel S-box of AES Algorithm Using Variable Mapping Technique , 2009 .
[10] Jeyamala Chandrasekaran,et al. ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .
[11] A. Moussa. Data encryption performance based on Blowfish , 2005, 47th International Symposium ELMAR, 2005..
[12] Onur Koçak,et al. Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..
[13] Omid Omidvar. Encyclopedia Of Cryptography And Security , 2005 .
[14] H. S. Mohan,et al. Performance Analysis of AES and MARS Encryption Algorithms , 2011 .
[15] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[16] Talaat A. Elgarf,et al. Dynamic AES-128 with Key-Dependent S-box , 2013 .
[17] Ramlan Mahmod,et al. A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[18] José María Sierra,et al. The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..
[19] S. G. Srikantaswamy,et al. AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS , 2011 .
[20] R. Gunasekaran,et al. A Novel Approach for Enciphering Data of Smaller Bytes , 2010 .
[21] R.K. Meyers,et al. An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] David Pointcheval,et al. OAEP: Optimal Asymmetric Encryption Padding , 2011, Encyclopedia of Cryptography and Security.
[24] Alexander Maximov,et al. Some Words on Cryptanalysis of Stream Ciphers , 2006 .
[25] Azmi Jaafar,et al. An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme , 2012, CSA 2012.
[26] Ed Dawson,et al. Strict key avalanche criterion , 1992, Australas. J Comb..
[27] Zaiton Muda,et al. The new approach of Rijndael key schedule , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[28] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[29] William Stallings,et al. Cryptography and network security , 1998 .
[30] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .