The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Twofish with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (17) 2004-2012 (16) 2013-2023 (15) 2024 (2)
Publication types (Num. hits)
article(12) incollection(2) inproceedings(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25 occurrences of 25 keywords

Results
Found 50 publication records. Showing 50 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
214Eli Biham, Vladimir Furman Improved Impossible Differentials on Twofish. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Twofish, cryptanalysis, impossible differential
106Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Chris Hall On the Twofish Key Schedule. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
70Helger Lipmaa On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF differential probability, Pseudo-Hadamard Transform, Twofish, linear functions
67Stefan Lucks The Saturation Attack - A Bait for Twofish. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
50Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
39Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
28Maddila Suresh Kumar, Vadlamani Nagalakshmi A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud. Search on Bibsonomy J. Inf. Knowl. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Pramod Singh Rathore, Mrinal Kanti Sarkar Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28A. Jenice Prabhu, S. Vallisree, S. N. Kumar, Ramachandran Sitharthan, M. Rajesh 0001, A. Ahilan, M. Usha Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing. Search on Bibsonomy FICTA (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Gabriela Mogos Quantum Biometric Fingerprint Encryption based on Twofish Algorithm. Search on Bibsonomy ISOCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Tanveer ul Haq, Tariq Shah, Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Ibrahim A. Hameed, Huma Jamil Improved Twofish Algorithm: A Digital Image Enciphering Application. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Hasan Dibas, Khair Eddin Sabri A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. Search on Bibsonomy ICIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Suhad Muhajer Kareem, Abdul Monem S. Rahma A novel approach for the development of the Twofish algorithm based on multi-level key space. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Elza Jintcharadze, Maksim Iavich Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. Search on Bibsonomy EWDTS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Rolou Lyn Rodriguez Maata, Ronald S. Cordova, Alrence Halibas Performance Analysis of Twofish Cryptography Algorithm in Big Data. Search on Bibsonomy ICSIE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad 0001, Muder Almiani, Raouf M. Ganda, Ahmed Oun Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. Search on Bibsonomy IoTSMS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28David Smekal, Jan Hajny, Zdenek Martinasek Hardware-Accelerated Twofish Core for FPGA. Search on Bibsonomy TSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Chujiao Ma, John A. Chandy, Zhijie Shi Algebraic Side-Channel Attack on Twofish. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Irfan A. Landge, B. K. Mishra Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. Search on Bibsonomy CICBA (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jose Javier Gonzalez Ortiz, Kevin J. Compton A Simple Power Analysis Attack on the Twofish Key Schedule. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
28Pablo Freyre, Nelson Díaz, Oristela Cuellar Variations to the Cryptographics Algorithms AES and Twofish. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
28Uli Kretzschmar, Armando Astarloa, Jesús Lázaro 0001 SEU Resilience of DES, AES and Twofish in SRAM-Based FPGA. Search on Bibsonomy ARC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Sohaib Majzoub, Hassan B. Diab MorphoSys reconfigurable hardware for cryptography: the twofish case. Search on Bibsonomy J. Supercomput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Subidh Ali, Debdeep Mukhopadhyay Differential Fault Analysis of Twofish. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Christophe De Cannière TWOFISH. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Seon-Keun Lee, Sun-Yeob Kim, Yoo-Chan Ra A Study on the Twofish Security Processor Design Using USB Interface Device. Search on Bibsonomy ICHIT (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Christophe De Cannière Twofish. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Choong-Mo Youn, Beom-Geun Lee High-speed Hardware Design for the Twofish Encryption Algorithm. Search on Bibsonomy J. Inform. and Commun. Convergence Engineering The full citation details ... 2005 DBLP  BibTeX  RDF
28Marco Macchetti Characteristics of Key-Dependent S-Boxes: the Case of Twofish. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
28Gianluca Catalini, Franco Chiaraluce, Lorenzo Ciccarelli, Ennio Gambi, Paola Pierleoni, Maurizio Reginelli Modified twofish algorithm for increasing security and efficiency in the encryption of video signals. Search on Bibsonomy ICIP (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Stefan Lucks The Saturation Attack - a Bait for Twofish. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2000 DBLP  BibTeX  RDF
28Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Niels Ferguson Comments on Twofish as an AES Candidate. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
28Bruce Schneier, Doug Whiting Twofish on Smart Cards. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stefan Tillich, Johann Großschädl VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
19Sohaib Majzoub, Hassan B. Diab Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable Platform. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang Functional Correctness Proofs of Encryption Algorithms. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19A. Murat Fiskiran, Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 On the Additive Differential Probability of Exclusive-Or. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Additive differential probability, differential cryptanalysis, rational series
19Gregory G. Rose, Philip Hawkes Turing: A Fast Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, Stream cipher, encryption, MAC
19Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
19Marcin Gomulkiewicz, Miroslaw Kutylowski Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware
19Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim A Comparative Study of Performance of AES Final Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19R. Reed Taylor, Seth Copen Goldstein A High-Performance Flexible Architecture for Cryptography. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #50 of 50 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license