Blowfish

Results: 54



#Item
41Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
42Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
43Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2004-12-30 09:37:46
44Ciphertext / Block cipher / Cipher / Differential cryptanalysis / Cryptanalysis / Blowfish / Known-plaintext attack / Weak key / Vigenère cipher / Cryptography / Espionage / Slide attack

A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2008-10-23 15:16:37
45Differential cryptanalysis / Blowfish / SAFER / ICE / Key schedule / Linear cryptanalysis / SXAL/MBAL / Q / S-box / Cryptography / Block ciphers / SHARK

1 The Cipher SHARK

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
46Feistel cipher / Cipher / Key schedule / Block ciphers / Data Encryption Standard / Blowfish / Cryptography / ICE / Weak key

Sinople: a 128-bit symmetric block cipher

Add to Reading List

Source URL: www.philippepaquet.com

Language: English - Date: 2011-01-20 03:20:41
47Key schedule / Crypt / Slide attack / Differential cryptanalysis / Cryptography / Blowfish / Weak key

A New Class of Weak Keys for Blowfish Orhun Kara and Cevat Manap ¨ ITAK

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
48Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
49ICE / Advanced Encryption Standard / Integral cryptanalysis / International Data Encryption Algorithm / CRYPTREC / SHARK / Crypt / Blowfish / Cryptography / Block ciphers / Hierocrypt

1 Improved SQUARE Attacks Against

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
50Ichthyology / Blowfish / Fugu / Tetraodontidae / Estuary / Fish / Venomous fish / Fisheries

PUBLISHED JANUARY 2011

Add to Reading List

Source URL: www.fish.wa.gov.au

Language: English - Date: 2012-04-25 20:58:58
UPDATE