Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer
暂无分享,去创建一个
[1] King Abdullah,et al. New Routing Algorithm for Hex-Cell Network , 2015 .
[2] Murat Dener,et al. Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[3] S. R. Biradar,et al. Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL , 2013 .
[4] Kris Gaj,et al. Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining , 2001, FPGA '01.
[5] Shahnawaz Hussain,et al. Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm: Based on Space Complexity , 2014 .
[6] Bruce Schneier,et al. On the Twofish Key Schedule , 1998, Selected Areas in Cryptography.
[7] Deepali D. Rane. Superiority of Twofish over Blowfish , 2016 .
[8] Qatawneh Mohammed. EMBEDDING LINEAR ARRAY NETWORK INTO THE TREE-HYPERCUBE NETWORK , 2005 .
[9] King Abdullah,et al. Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer , 2016 .
[10] Mansoor Ebrahim,et al. Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.
[11] Mohammad Qatawneh. New Efficient Algorithm for Mapping Linear Array into Hex-Cell Network , 2016 .
[12] Harsh K. Verma,et al. Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms , 2012 .
[13] Mohammad Saraireh. A Novel Security Scheme based on Twofish and Discrete Wavelet Transform , 2017 .
[14] Mohammad Qatawneh. Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems , 2011, Int. J. Commun. Netw. Syst. Sci..
[15] Stefan Lucks. The Saturation Attack - A Bait for Twofish , 2000, FSE.
[16] K nbspAparna.,et al. A Study of Twofish Algorithm , 2016 .
[17] Mohammad Qatawneh,et al. Embedding Binary Tree and Bus into Hex-Cell Interconnection Network , 2011 .