Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
139 | T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi |
DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings, pp. 625-639, 2005, Springer, 3-540-29643-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration |
129 | Brian Cody, Justin Madigan, Spencer MacDonald, Kenneth W. Hsu |
High speed SOC design for blowfish cryptographic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: IFIP VLSI-SoC 2007, IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip, Atlanta, GA, USA, 15-17 October 2007, pp. 284-287, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 167-180, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
77 | Jorge Nakahara Jr. |
A Linear Analysis of Blowfish and Khufu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 20-32, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis |
46 | Yeong-Kang Lai, Yu-Chuan Shu |
VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 2001 International Symposium on Circuits and Systems, ISCAS 2001, Sydney, Australia, May 6-9, 2001, pp. 57-60, 2001, IEEE, 0-7803-6685-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin |
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 8-12 March 2005, Kauai Island, HI, USA, pp. 127-136, 2005, IEEE Computer Society, 0-7695-2299-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Sandy Harris, Carlisle M. Adams |
Key-Dependent S-Box Manipulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 15-26, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | S. Radha, S. Jeyalaksshmi |
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(6), pp. 796, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sunil Kumar, Dilip Kumar 0006, Naini Singh |
Performance and security analysis using B-128 modified blowfish algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(17), pp. 26661-26678, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sunil Kumar, Dilip Kumar |
Performance evaluation and design of B-128 modified Blowfish algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 6(5), September/October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Ch. Chakradhara Rao, Tryambak Hiwarkar, B. Santhosh Kumar |
Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Control. Decis. ![In: J. Control. Decis. 10(4), pp. 494-503, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Naveen Rahite C, Manoj Senthil K |
An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, Delhi, India, July 6-8, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-3509-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef |
Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 11, pp. 76, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | S. Immaculate Shyla, S. S. Sujatha |
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 13(1), pp. 151-163, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Swati Kumari |
Enhancing the Quantum Communication Channel Using a Novel Quantum Binary Salt Blowfish Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 123(2), pp. 1085-1102, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail |
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 127(4), pp. 3615-3635, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 14(1), April 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou |
A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 68(1), pp. 538-548, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Pradeep Kumar 0010, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, Cioca Adriana Lavinia |
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(22), pp. 8620, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Abidemi Adeniyi, Sanjay Misra, Eniola Daniel, Bokolo Anthony Jr. |
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithms ![In: Algorithms 15(10), pp. 373, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | S. Divya, K. V. Prema, Balachandra Muniyal |
Modified Blowfish Encryption Algorithm for Wireless Body Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATIS ![In: Applications and Techniques in Information Security - 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers, pp. 98-108, 2022, Springer, 978-981-99-2263-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie |
Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022, pp. 193-197, 2022, IEEE, 978-1-6654-8009-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler |
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2, pp. 398-408, 2022, Springer, 978-3-030-99586-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | |
Implementation of enhanced blowfish algorithm in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 12(3), pp. 3999-4005, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Majed AlOtaibi 0002 |
Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 159187-159197, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Syed Zeeshan Abbas, Haroon Ibrahim, Majid Khan |
A hybrid chaotic blowfish encryption for high-resolution satellite imagery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(17), pp. 26069-26091, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | E. Dinesh, S. M. Ramesh |
Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 30(1), pp. 2150004:1-2150004:17, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Jiaxiang Liu, Karl Knopf, Yiqing Tan, Bolin Ding, Xi He 0001 |
Catch a Blowfish Alive: A Demonstration of Policy-Aware Differential Privacy for Interactive Data Exploration. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 14(12), pp. 2859-2862, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Elie Chicha, Bechara al Bouna, Mohamed Nassar 0001, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah 0002, Djamal Benslimane, Mansour Naser Alraja |
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 21(1), pp. 20:1-20:25, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021, pp. 344-349, 2021, IEEE, 978-1-6654-2870-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou |
A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.05975, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Mohamed Nassar 0001, Elie Chicha, Bechara al Bouna, Richard Chbeir |
VIP Blowfish Privacy in Communication Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020., pp. 459-467, 2020, ScitePress, 978-989-758-446-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Rafidah Ahmad, Daniel C. K. Kho, Asrulnizam Bin Abd Manaf, Widad Ismail |
Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 104(1), pp. 471-489, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Elza Jintcharadze, Maksim Iavich |
Public-Key hybrid cryptosystem based on Blowfish and RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVUS ![In: Proceedings of the International Conference on Information Technologies, IVUS 2019, Kaunas, Lithuania, April 25, 2019., pp. 52-55, 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Noah Oluwatobi Akande, Christiana Oluwakemi Abikoye, Marion Olubunmi Adebiyi, Anthonia Aderonke Kayode, Adekanmi Adeyinka Adegun, Roseline Oluwaseun Ogundokun |
Electronic Medical Information Encryption Using Modified Blowfish Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2019 - 19th International Conference, Saint Petersburg, Russia, July 1-4, 2019, Proceedings, Part V, pp. 166-179, 2019, Springer, 978-3-030-24307-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Wassim Alexan, Farah Hemeida |
Security Through Blowfish and LSB Bit-Cycling With Mathematical Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPA ![In: Signal Processing: Algorithms, Architectures, Arrangements, and Applications, SPA 2019, Poznan, Poland, September 18-20, 2019, pp. 229-234, 2019, IEEE, 978-83-62065-36-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ariel Roy L. Reyes, Enrique D. Festijo, Ruji P. Medina |
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 10(1), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina |
A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNCC ![In: Proceedings of the VII International Conference on Network, Communication and Computing, ICNCC 2018, Taipei City, Taiwan, December 14-16, 2018, pp. 140-145, 2018, ACM, 978-1-4503-6553-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina |
Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, December 29-31, Hong Kong, China, pp. 157-162, 2018, ACM, 978-1-4503-6629-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Irfan A. Landge, B. K. Mishra |
Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICBA (1) ![In: Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part I, pp. 567-581, 2017, Springer, 978-981-10-6426-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | K. Janakiraman, T. Baghyasree, D. Parkavi |
Highly secure data transmission for industrial network using blowfish algorithm in embedded processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 8(2), pp. 168-182, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | P. Dileep Kumar Reddy, R. Praveen Sam, Shoba Bindu Chigarepalli |
Optimal blowfish algorithm-based technique for data security in cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 11(2), pp. 171-189, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Anurag Khandelwal, Rachit Agarwal 0001, Ion Stoica |
BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, Santa Clara, CA, USA, March 16-18, 2016, pp. 485-500, 2016, USENIX Association, 978-1-931971-29-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman |
Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSysS ![In: International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-0203-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Kapil Earanky, Haytham Elmiligi, Musfiq Rahman |
GPU-acceleration of blowfish cryptographic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACRIM ![In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM 2015, Victoria, BC, Canada, August 24-26, 2015, pp. 507-512, 2015, IEEE, 978-1-4673-7788-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Spencer Davis, Brandon Jones, Hai Jiang 0003 |
Portable parallelized blowfish via RenderScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015, Takamatsu, Japan, June 1-3, 2015, pp. 175-180, 2015, IEEE Computer Society, 978-1-4799-8676-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Samuel Haney, Ashwin Machanavajjhala, Bolin Ding |
Answering Query Workloads with Optimal Error under Blowfish Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1404.3722, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Swagata Roy Chatterjee, Soham Majumder, Bodhisatta Pramanik, Mohuya Chakraborty |
FPGA Implementation of Pipelined Blowfish Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISED ![In: 2014 Fifth International Symposium on Electronic System Design, Surathkal, Mangalore, India, December 15-17, 2014, pp. 208-209, 2014, IEEE Computer Society, 978-1-4799-6965-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xi He 0001, Ashwin Machanavajjhala, Bolin Ding |
Blowfish privacy: tuning privacy-utility trade-offs using policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014, pp. 1447-1458, 2014, ACM, 978-1-4503-2376-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xi He 0001, Ashwin Machanavajjhala, Bolin Ding |
Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1312.3913, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Christophe De Cannière |
Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 157-158, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | P. Karthigaikumar, K. Baskaran |
Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Image Graph. ![In: Int. J. Image Graph. 10(3), pp. 327-341, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | P. Karthigaikumar, K. Baskaran |
An ASIC implementation of low power and high throughput blowfish crypto algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. J. ![In: Microelectron. J. 41(6), pp. 347-355, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Kiavash Bahreini |
Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 449-455, 2008, CSREA Press, 1-60132-085-X. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Mark White, Tai-Chi Lee, Michael Gubody |
Blowfish Encryption/Decryption Using FPGA and Custom Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDPTA ![In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes, pp. 164-169, 2008, CSREA Press, 1-60132-084-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Christophe De Cannière |
Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dieter Schmidt |
Kaweichel, an Extension of Blowfish for 64-Bit Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 144, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | |
On the Key Schedule of Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 63, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | Michael C.-J. Lin, Youn-Long Lin |
A VLSI implementation of the blowfish encryption/decryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of ASP-DAC 2000, Asia and South Pacific Design Automation Conference 2000, Yokohama, Japan, pp. 1-2, 2000, ACM, 0-7803-5974-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | João M. S. Alcântara, Sergio C. Salomão, Edson do Prado Granja, Vladimir Castro Alves, Felipe M. G. França |
Synchronous to Asynchronous Conversion - A Case Study: the Blowfish Algorithm Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI ![In: VLSI: Systems on a Chip, IFIP TC10/WG10.5 Tenth International Conference on Very Large Scale Integration (VLSI '99), December 1-4, 1999, Lisbon, Portugal, pp. 173-180, 1999, Kluwer, 0-7923-7731-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
25 | Serge Vaudenay |
On the Weak Keys of Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings, pp. 27-32, 1996, Springer, 3-540-60865-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
25 | Bruce Schneier |
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings, pp. 191-204, 1993, Springer, 3-540-58108-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Eric Whitman Smith, David L. Dill |
Automatic Formal Verification of Block Cipher Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCAD ![In: Formal Methods in Computer-Aided Design, FMCAD 2008, Portland, Oregon, USA, 17-20 November 2008, pp. 1-7, 2008, IEEE, 978-1-4244-2735-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr |
ASIP architecture exploration for efficient IPSec encryption: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 6(2), pp. 12, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computer-aided design, ADL, ASIP, IPSec |
21 | Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya |
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 128-131, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 142-146, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
21 | A. Murat Fiskiran, Ruby B. Lee |
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 526-531, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr |
ASIP Architecture Exploration for Efficient Ipsec Encryption: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCOPES ![In: Software and Compilers for Embedded Systems, 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004, Proceedings, pp. 33-46, 2004, Springer, 3-540-23035-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Alex Biryukov, David A. Wagner 0001 |
Slide Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 245-259, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Stephen Charlwood, Philip James-Roxby |
Evaluation of the XC6200-series Architecture for Cryptographic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, From FPGAs to Computing Paradigm, 8th International Workshop, FPL'98, Tallinn, Estonia, August 31 - September 3, 1998, Proceedings, pp. 218-227, 1998, Springer, 3-540-64948-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Schneier, Doug Whiting |
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 242-259, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|