An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
暂无分享,去创建一个
[1] Carlisle M. Adams,et al. The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.
[2] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, Annual International Cryptology Conference.
[3] K. G,et al. A MODIFIED CRYPTO SCHEME FOR ENHANCING DATA SECURITY , 2012 .
[4] Jaime Raigoza,et al. Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[5] H. S. Mohan,et al. Performance Analysis of AES and MARS Encryption Algorithms , 2011 .
[6] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[7] Kenneth W. Hsu,et al. High speed SOC design for blowfish cryptographic algorithm , 2007, 2007 IFIP International Conference on Very Large Scale Integration.
[8] N KrishnamurthyG,et al. Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis , 2009 .
[9] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[10] Gaëtan Leurent,et al. Narrow-Bicliques: Cryptanalysis of Full IDEA , 2012, EUROCRYPT.
[11] Pushpa R. Suri,et al. A Cipher based on 3D Array Block Rotation , 2010 .
[12] A. Tamimi. Performance Analysis of Data Encryption Algorithms , 2006 .
[13] V Ramaswamy,et al. Performance Enhancement Of Blowfish Algorithm By Modifying Its function , 2007 .
[14] William Stallings,et al. Cryptography and network security , 1998 .
[15] John C. Russ,et al. Introduction to Image Processing and Analysis , 2007 .
[16] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[17] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[18] Aamna Patel,et al. Image encryption and decryption using blowfish algorithm , 2012 .
[19] Zaiton Muda,et al. The new approach of Rijndael key schedule , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[20] G. Manikandan,et al. A New Approach for Improving Data Security using Iterative Blowfish Algorithm , 2012 .
[21] Faudziah Ahmad,et al. Randomness analysis on blowfish block cipher using ECB and CBC modes , 2013 .
[22] Mohie M. Hadhoud,et al. Energy Efficiency of Encryption Schemes for Wireless Devices , 2009 .
[23] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[24] Juan Soto,et al. Randomness Testing of the AES Candidate Algorithms , 1999 .
[25] Daniel J. Bernstein,et al. The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[26] Zaiton Muda,et al. Key Transformation Approach for Rijndael Security , 2010 .
[27] W. Beyer. CRC Standard Mathematical Tables and Formulae , 1991 .
[28] M. D. Yücel,et al. Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .
[29] Y. Wu,et al. Design Challenges in Security Processing , 2004 .
[30] Mohd Ali,et al. A New 128-Bit Block Cipher , 2009 .
[31] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[32] H. Feistel. Cryptography and Computer Privacy , 1973 .
[33] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[34] Tingyuan Nie,et al. Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.
[35] Obaida Mohammad Awad,et al. NEW CRYPTOGRAPHIC ALGORITHMS FOR ENHANCING SECURITY OF VOICE DATA , 2010 .
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[37] Khalid Al-Zamil,et al. Performance evaluation of three encryption/decryption algorithms , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[38] Sherif Abdulbari Ali. Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm , 2005 .
[39] Malik Imran,et al. Performance Evaluation of Symmetric Cryptography Algorithms : A Survey 1 , 2013 .
[40] I. Abd-ElGhafar,et al. Generation of AES Key Dependent S-Boxes using RC4 Algorithm , 2009 .
[41] Terry Ritter,et al. Substitution Cipher with Pseudo-Random Shuffling: the Dynamic Substitution Combiner , 1990, Cryptologia.
[42] Martin Boesgaard,et al. The Rabbit Stream Cipher - Design and Security Analysis , 2004, IACR Cryptol. ePrint Arch..
[43] H. M. Elkamchouchi,et al. Dynamically key-controlled symmetric block cipher KAMFEE , 2003, Proceedings of the Twentieth National Radio Science Conference (NRSC'2003) (IEEE Cat. No.03EX665).
[44] Jeyamala Chandrasekaran,et al. ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .
[45] Alexander Maximov,et al. Some Words on Cryptanalysis of Stream Ciphers , 2006 .
[46] K. ThirunadanaSikamani,et al. A secure PMS based on Fingerprint Authentication and Blowfish cryptographic algorithm , 2010, 2010 International Conference on Signal and Image Processing.
[47] Kwok-Wo Wong,et al. True random number generator based on mouse movement and chaotic hash function , 2009, Inf. Sci..
[48] Faudziah Ahmad,et al. Analysis of Some Security Criteria for S-boxes in Blowfish Algorithm , 2013 .
[49] Howard M. Heys,et al. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.
[50] Pratap Chandra Mandal. Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish , 2012 .
[51] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[52] Liam Keliher,et al. Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes , 1997 .
[53] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[54] Tariq Shah,et al. Comparative Analysis of S-boxes Based on Graphical SAC , 2010 .
[55] An Braeken,et al. Cryptographic Properties of Boolean Functions and S-Boxes (Cryptografische eigenschappen van Booleaanse functies en S-Boxen) , 2006 .
[56] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[57] Thomas Hardjono,et al. Security in Wireless LANs and MANs , 2005 .
[58] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[59] Ashwaq T. Hashim,et al. Design and Implementation of an Improvement Of Blowfish Encryption Algorithm , 2009 .
[60] Muhammad Reza Z'aba,et al. Randomness analysis on LED block ciphers , 2012, SIN '12.
[61] Kazys Kazlauskas,et al. Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.
[62] Eva Gustafsson,et al. Stream Cipher Design , 2006 .
[63] George W. Collins,et al. The foundations of celestial mechanics , 1989 .
[64] Yeong-Kang Lai,et al. A novel VLSI architecture for a variable-length key, 64-bit Blowfish block cipher , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[65] S.H. El-Ramly,et al. Dynamic generation of s-boxes in block cipher systems , 2001, Proceedings of the Eighteenth National Radio Science Conference. NRSC'2001 (IEEE Cat. No.01EX462).
[66] Jorge Nakahara,et al. A Linear Analysis of Blowfish and Khufu , 2007, ISPEC.
[67] Ali Ahmad Milad,et al. Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack) , 2012 .
[68] Khin Maung Latt,et al. New Analysis Methods on Strict Avalanche Criterion of S-Boxes , 2008 .
[69] Mark Stamp,et al. Information security - principles and practice , 2005 .
[70] Tanja Magoc,et al. Symmetric Cryptosystems and Symmetric Key Management , 2007 .
[71] Hongjun Wu. A New Stream Cipher HC-256 , 2004, FSE.
[72] Willis F. Kern,et al. Solid mensuration : with proofs , 1938 .
[73] Yas A. Alsultanny,et al. Generating and Testing Random Key for Image Encryption using ECB and CBC Modes , 2006 .
[74] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[75] H.M. Elkamchouchi,et al. Kamkar symmetric block cipher , 2004, Proceedings of the Twenty-First National Radio Science Conference, 2004. NRSC 2004..
[76] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[77] Selçuk Kavut,et al. On Some Cryptographic Properties of Rijndael , 2001, MMM-ACNS.
[78] Monisha Sharma,et al. Implementation and analysis of various symmetric cryptosystems , 2010 .
[79] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[80] Mohammed M. Alani,et al. Testing Randomness in Ciphertext of Block-Ciphers Using DieHard Tests , 2010 .
[81] Faiz Yousif Mohammad,et al. A Novel S-box of AES Algorithm Using Variable Mapping Technique , 2009 .
[82] Onur Koçak,et al. Evaluation of Randomness Test Results for Short Sequences , 2010, SETA.
[83] Talaat A. Elgarf,et al. Dynamic AES-128 with Key-Dependent S-box , 2013 .
[84] Eli Biham,et al. NESSIE security report y , 2002 .
[85] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[86] Dieter Schmidt. Kaweichel, an Extension of Blowfish for 64-Bit Architectures , 2005, IACR Cryptol. ePrint Arch..
[87] Daniel Zwillinger,et al. CRC standard mathematical tables and formulae; 30th edition , 1995 .
[88] Faudziah Ahmad,et al. Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes , 2013 .
[89] Jorge Nakahara,et al. 3D: A Three-Dimensional Block Cipher , 2008, CANS.
[90] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[91] P. Suresh Kumar,et al. FPGA Implementation of Blowfish Cryptosystem Using VHDL , 2013 .
[92] K. Baskaran,et al. An ASIC implementation of low power and high throughput blowfish crypto algorithm , 2010, Microelectron. J..
[93] F. Ayoub. Probabilistic completeness of substitution-permutation encryption networks , 1982 .
[94] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[95] Murray R. Spiegel,et al. Theory and problems of advanced calculus , 2017 .
[96] Ed Dawson,et al. Strict key avalanche criterion , 1992, Australas. J Comb..
[97] Martin Boesgaard,et al. Rabbit: A New High-Performance Stream Cipher , 2003, FSE.
[98] Thomas W. Cusick,et al. Stream Cipher Design , 2009 .
[99] R. Gunasekaran,et al. A Novel Approach for Enciphering Data of Smaller Bytes , 2010 .
[100] Sergey Doroshenko,et al. Experimental Statistical Attacks on Block and Stream Ciphers , 2008 .
[101] Nikolai Stoianov. One Approach of Using Key-Dependent S-BOXes in AES , 2011, MCSS.
[102] A. Rukhin,et al. Statistical Testing of Random Number Generators , 1999 .
[103] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[104] Zhu Wang,et al. Design and Optimization of Hybrid MD5-Blowfish Encryption on GPUs , 2011 .
[105] Pushpa R. Suri and Sukhvinder Singh Deora. 3D Array Block Rotation Cipher: An Improvement using lateral shift , 2011 .
[106] Melek D. Yücel,et al. Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .
[107] Vinod Patidar,et al. A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.
[108] Richard Mollin. An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.
[109] Rehab F. Hassan,et al. New Approach for Modifying Blowfish Algorithm by Using Multiple Keys , 2011 .
[110] Aly A. Fahmy,et al. A Proposal For A Key-Dependent AES , 2005 .
[111] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[112] Onur Koçak,et al. Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..
[113] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[114] Serge Vaudenay,et al. Perfect Diffusion Primitives for Block Ciphers , 2004, Selected Areas in Cryptography.
[115] Shai Halevi,et al. MARS - a candidate cipher for AES , 1999 .
[116] Serge Mister,et al. Practical S-Box Design , 1996 .
[117] Salasiah Sulaiman,et al. A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling , 2012 .
[118] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[119] Vasilios Katos. A randomness test for block ciphers , 2005, Appl. Math. Comput..
[120] Ramlan Mahmod,et al. Security analysis of blowfish algorithm , 2013, 2013 Second International Conference on Informatics & Applications (ICIA).
[121] Ya-Ping Zhang,et al. A stream cipher algorithm based on conventional encryption techniques , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[122] Anne Canteaut,et al. Sosemanuk, a Fast Software-Oriented Stream Cipher , 2008, The eSTREAM Finalists.
[123] Noohul Basheer Zain Ali,et al. Optimal Datapath Design for a Cryptographic Processor: The Blowfish Algorithm , 2001 .
[124] R.K. Meyers,et al. An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.
[125] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[126] Runtong Zhang,et al. A block cipher using key-dependent S-box and P-boxes , 2008, 2008 IEEE International Symposium on Industrial Electronics.
[127] Ritu Agarwal,et al. Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[128] A. Moussa. Data encryption performance based on Blowfish , 2005, 47th International Symposium ELMAR, 2005..
[129] Ramlan Mahmod,et al. A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[130] José María Sierra,et al. The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..
[131] Tinku Acharya,et al. Image Processing: Principles and Applications , 2005, J. Electronic Imaging.
[132] Michael C.-J. Lin,et al. A VLSI implementation of the blowfish encryption/decryption algorithm , 2000, ASP-DAC.