The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Blowfish with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2005 (16) 2006-2014 (16) 2015-2020 (16) 2021-2022 (18) 2023 (5)
Publication types (Num. hits)
article(30) incollection(2) inproceedings(39)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 12 keywords

Results
Found 71 publication records. Showing 71 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
139T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration
129Brian Cody, Justin Madigan, Spencer MacDonald, Kenneth W. Hsu High speed SOC design for blowfish cryptographic algorithm. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
97Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
77Jorge Nakahara Jr. A Linear Analysis of Blowfish and Khufu. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis
46Yeong-Kang Lai, Yu-Chuan Shu VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Sandy Harris, Carlisle M. Adams Key-Dependent S-Box Manipulations. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25S. Radha, S. Jeyalaksshmi Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Sunil Kumar, Dilip Kumar 0006, Naini Singh Performance and security analysis using B-128 modified blowfish algorithm. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Sunil Kumar, Dilip Kumar Performance evaluation and design of B-128 modified Blowfish algorithm. Search on Bibsonomy Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Ch. Chakradhara Rao, Tryambak Hiwarkar, B. Santhosh Kumar Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm. Search on Bibsonomy J. Control. Decis. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Naveen Rahite C, Manoj Senthil K An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25S. Immaculate Shyla, S. S. Sujatha Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Swati Kumari Enhancing the Quantum Communication Channel Using a Novel Quantum Binary Salt Blowfish Strategy. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Pradeep Kumar 0010, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, Cioca Adriana Lavinia Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Emmanuel Abidemi Adeniyi, Sanjay Misra, Eniola Daniel, Bokolo Anthony Jr. Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. Search on Bibsonomy Algorithms The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25S. Divya, K. V. Prema, Balachandra Muniyal Modified Blowfish Encryption Algorithm for Wireless Body Area Network. Search on Bibsonomy ATIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. Search on Bibsonomy AINA (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25 Implementation of enhanced blowfish algorithm in cloud environment. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Majed AlOtaibi 0002 Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Syed Zeeshan Abbas, Haroon Ibrahim, Majid Khan A hybrid chaotic blowfish encryption for high-resolution satellite imagery. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25E. Dinesh, S. M. Ramesh Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Jiaxiang Liu, Karl Knopf, Yiqing Tan, Bolin Ding, Xi He 0001 Catch a Blowfish Alive: A Demonstration of Policy-Aware Differential Privacy for Interactive Data Exploration. (PDF / PS) Search on Bibsonomy Proc. VLDB Endow. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Elie Chicha, Bechara al Bouna, Mohamed Nassar 0001, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah 0002, Djamal Benslimane, Mansour Naser Alraja A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Hasan Dibas, Khair Eddin Sabri A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. Search on Bibsonomy ICIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish Privacy. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Mohamed Nassar 0001, Elie Chicha, Bechara al Bouna, Richard Chbeir VIP Blowfish Privacy in Communication Graphs. Search on Bibsonomy ICETE (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Rafidah Ahmad, Daniel C. K. Kho, Asrulnizam Bin Abd Manaf, Widad Ismail Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Elza Jintcharadze, Maksim Iavich Public-Key hybrid cryptosystem based on Blowfish and RSA. Search on Bibsonomy IVUS The full citation details ... 2019 DBLP  BibTeX  RDF
25Noah Oluwatobi Akande, Christiana Oluwakemi Abikoye, Marion Olubunmi Adebiyi, Anthonia Aderonke Kayode, Adekanmi Adeyinka Adegun, Roseline Oluwaseun Ogundokun Electronic Medical Information Encryption Using Modified Blowfish Algorithm. Search on Bibsonomy ICCSA (5) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Wassim Alexan, Farah Hemeida Security Through Blowfish and LSB Bit-Cycling With Mathematical Sequences. Search on Bibsonomy SPA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Ariel Roy L. Reyes, Enrique D. Festijo, Ruji P. Medina Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
25Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm. Search on Bibsonomy ICNCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing. Search on Bibsonomy ICIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Irfan A. Landge, B. K. Mishra Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. Search on Bibsonomy CICBA (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25K. Janakiraman, T. Baghyasree, D. Parkavi Highly secure data transmission for industrial network using blowfish algorithm in embedded processors. Search on Bibsonomy Int. J. Adv. Intell. Paradigms The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25P. Dileep Kumar Reddy, R. Praveen Sam, Shoba Bindu Chigarepalli Optimal blowfish algorithm-based technique for data security in cloud. Search on Bibsonomy Int. J. Bus. Intell. Data Min. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Anurag Khandelwal, Rachit Agarwal 0001, Ion Stoica BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores. Search on Bibsonomy NSDI The full citation details ... 2016 DBLP  BibTeX  RDF
25Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. Search on Bibsonomy NSysS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Kapil Earanky, Haytham Elmiligi, Musfiq Rahman GPU-acceleration of blowfish cryptographic algorithm. Search on Bibsonomy PACRIM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Spencer Davis, Brandon Jones, Hai Jiang 0003 Portable parallelized blowfish via RenderScript. Search on Bibsonomy SNPD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Samuel Haney, Ashwin Machanavajjhala, Bolin Ding Answering Query Workloads with Optimal Error under Blowfish Privacy. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
25Swagata Roy Chatterjee, Soham Majumder, Bodhisatta Pramanik, Mohuya Chakraborty FPGA Implementation of Pipelined Blowfish Algorithm. Search on Bibsonomy ISED The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Xi He 0001, Ashwin Machanavajjhala, Bolin Ding Blowfish privacy: tuning privacy-utility trade-offs using policies. Search on Bibsonomy SIGMOD Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Xi He 0001, Ashwin Machanavajjhala, Bolin Ding Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
25Christophe De Cannière Blowfish. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25P. Karthigaikumar, K. Baskaran Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. Search on Bibsonomy Int. J. Image Graph. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25P. Karthigaikumar, K. Baskaran An ASIC implementation of low power and high throughput blowfish crypto algorithm. Search on Bibsonomy Microelectron. J. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Kiavash Bahreini Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. Search on Bibsonomy Security and Management The full citation details ... 2008 DBLP  BibTeX  RDF
25Mark White, Tai-Chi Lee, Michael Gubody Blowfish Encryption/Decryption Using FPGA and Custom Instructions. Search on Bibsonomy PDPTA The full citation details ... 2008 DBLP  BibTeX  RDF
25Christophe De Cannière Blowfish. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Dieter Schmidt Kaweichel, an Extension of Blowfish for 64-Bit Architectures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
25 On the Key Schedule of Blowfish. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
25Michael C.-J. Lin, Youn-Long Lin A VLSI implementation of the blowfish encryption/decryption algorithm. Search on Bibsonomy ASP-DAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25João M. S. Alcântara, Sergio C. Salomão, Edson do Prado Granja, Vladimir Castro Alves, Felipe M. G. França Synchronous to Asynchronous Conversion - A Case Study: the Blowfish Algorithm Implementation. Search on Bibsonomy VLSI The full citation details ... 1999 DBLP  BibTeX  RDF
25Serge Vaudenay On the Weak Keys of Blowfish. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
25Bruce Schneier Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). Search on Bibsonomy FSE The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Eric Whitman Smith, David L. Dill Automatic Formal Verification of Block Cipher Implementations. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr ASIP architecture exploration for efficient IPSec encryption: A case study. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computer-aided design, ADL, ASIP, IPSec
21Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
21A. Murat Fiskiran, Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr ASIP Architecture Exploration for Efficient Ipsec Encryption: A Case Study. Search on Bibsonomy SCOPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Alex Biryukov, David A. Wagner 0001 Slide Attacks. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Stephen Charlwood, Philip James-Roxby Evaluation of the XC6200-series Architecture for Cryptographic Applications. Search on Bibsonomy FPL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Bruce Schneier, Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #71 of 71 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license