Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)
暂无分享,去创建一个
[1] Antoine Joux,et al. Report on the AES Candidates , 1999 .
[2] Lars R. Knudsen,et al. New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract) , 1994, EUROCRYPT.
[3] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[4] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[5] Thomas A. Berson,et al. Differential Cryptanalysis Mod 2^32 with Applications to MD5 , 1992, EUROCRYPT.
[6] Ernest Ambler,et al. Guidelines for Implementing and Using the NBS Data Encryption Standard , 1995 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Lars R. Knudsen,et al. DES-X (or DESX) , 2005, Encyclopedia of Cryptography and Security.
[9] Mitsuru Matsui,et al. On Correlation Between the Order of S-boxes and the Strength of DES , 1994, EUROCRYPT.
[10] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[11] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.
[12] D. Chaum,et al. Di(cid:11)erential Cryptanalysis of the full 16-round DES , 1977 .
[13] Eli Biham,et al. An Improvement of Davies' Attack on DES , 1994, EUROCRYPT.
[14] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[16] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[17] Eli Biham. A Note on Comparing the AES Candidates , 1999 .
[18] P H Abelson,et al. National institute for science and technology. , 1994, Science.
[19] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[20] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[21] Eli Biham,et al. An improvement of Davies’ attack on DES , 1994, Journal of Cryptology.
[22] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.