DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Blowfish (cipher)
Blowfish (cipher)
Report on the AES Candidates
Miss in the Middle Attacks on IDEA and Khufu
Comparative Analysis of Advanced Encryption Standard, Blowfish and Rivest Cipher 4 Algorithms
AES, Blowfish and Twofish for Security of Wireless Networks
A New Stream Cipher HC-256
AES3 Presentation
Security Policy: HID Global Cryptographic Module
Statistical Cryptanalysis of Block Ciphers
A New Stream Cipher HC-256 *
An Efficient Implementation of the Blowfish Encryption Algorithm
Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH
Understanding How to Prevent Sensitive Data Exposure
On the Weak Keys of Blowfish
FIPS 140-2 Security Policy
Performance Analysis of AES and Blowfish Encryption Algorithm
A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications
Modern Cryptanalysis.Pdf
Linear Cryptanalysis Combined Attack on Cryptographic Security System
Top View
Comparison of DES, AES, Blowfish and Twofish Symmetric Key Cryptography Algorithms
Enhancing Image Security by Employing Blowfish Algorithm Further Embedding Text and Stitching the RGB Components of a Host Image
(In-)Security of 64-Bit Block Ciphers Karthikeyan Bhargavan, Gaëtan Leurent
Cryptanalysis of Some Block Cipher Constructions
Comparative Study on Blowfish & Twofish Algorithms in Iot Applications
Optimization and Benchmark of Cryptographic Algorithms on Network Processors*
Blowfish Privacy: Tuning Privacy-Utility Trade-Offs Using Policies
(In-)Security of 64-Bit Block Ciphers
BLOWFISH Is Used Frequently Because: 1
Comparafive Analysis of Cryptographic Algorithms
A Advanced Encryption Standard See AES AES 35–64 AES Process And
Introdu Uction to B Blowfish
Block Ciphers (Blowfish).Pdf
My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
Stream Cipher HC-256 *
Evolution of AES, Blowfish and Two Fish Encryption Algorithm 1E.Jeevalatha, 2Mr.S.Senthilmurugan
Text and Biomedical Images Disguising Using Advanced Encryption Standard
An Implementation of Blowfish Algorithm Using FPGA Arya S Dept
Available Online Journal of Scientific and Engineering Research, 2021, 8(1):174-188 Research Article Comprehensive
Increase Throughput of CCM Security Mode Using MKP
Symmetric Algorithm Survey: a Comparative Analysis
Tion Algorithm for an Internet of Things Device
An Optimized Encryption Algorithm and F Function with Dynamic Substitution for Creating S-Box and P-Box Entries for Blowfish Algorithm
AES Candidate C
15-853: Algorithms in the Real World
Twofish: a 128-Bit Block Cipher
Efficient Secure Date Sharing in Cloud Storage Using Key-Aggregate Cryptosystems
Blowfish-128: a Modified Blowfish Algorithm That Supports 128-Bit Block Size
Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1
Superiority of Twofish Over Blowfish Deepali D
144. Analysis of Modified Blowfish Algorithm in Different Cases with Various Parameters
Side Channel Cryptanalysis of Product Ciphers
Comparative Study on Blowfish and Twofish Algorithms for Image Encryption and Decryption
Blowfish Algorithm
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
A Comparative Study of AES, Blowfish, Two Fish and Serpent Cryptography
Stream Ciphers
The Bouncy Castle FIPS Java API in 100 Examples
CS259 Introduction
Cryptography and Computer Security
Unbalanced Feistel Networks and Block-Cipher Design
Copyrighted Material
VLSI Architecture Implementation for Blowfish Block Cipher
An Alternate Key Scheduling Algorithm for Blowfish and Its Performance Analysis
Jetico User Manual
Analysis of Various Cryptographic Algorithms
Transforming Shark Hazard Policy: Learning from Ocean-Users and Shark Encounter in Western Australia