. .
.
BLOWFISHENC: Blowfish Encryption Algorithm
.
.

 


  1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, Inc. 1996.

 

  1. B. Schneier, "Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)," Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 1994, Proceedings, Springer-Verlag,1994, pp.191-204.


  1. S. Vaudenay, "On the Weak Keys in Blow sh," Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag, 1996, pp. 27-32.

 

  1. P. Karthigai Kumar and K. Baskaran. 2010. An ASIC implementation of low power and high throughput blowfish crypto algorithm. Microelectron. J. 41, 6 (June 2010), 347-355.


  1. Tingyuan Nie; Chuanwang Song; Xulong Zhi; , "Performance Evaluation of DES and Blowfish Algorithms," Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on , vol., no., pp.1-4, 23- 25 April 2010.
 
  1. Tingyuan Nie; Teng Zhang; , "A study of DES and Blowfish encryption algorithm," TENCON 2009 - 2009 IEEE Region 10 Conference , vol., no., pp.1-4, 23-26 Jan. 2009

 

  1. Hager, C.T.R.; Midkiff, S.F.; Park, J.-M.; Martin, T.L.; , "Performance and energy efficiency of block ciphers in personal digital assistants," Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on , vol., no., pp. 127- 136, 8-12 March 2005

 

  1. Products that Use Blowfish, http://www.schneier.com/blowfish-products.html

 

  1. Blowfish Advanced CS, http://www.lassekolb.info/bfacs.htm

 

  1. Access manager, http://www.accessmanager.co.uk/

 

  1. AEdit, http://sepp.zutphen.nu/aedit/

 

Cite this Simulator:

.....
..... .....
Copyright @ 2017 Under the NME ICT initiative of MHRD (Licensing Terms)
 Powered by AmritaVirtual Lab Collaborative Platform [ Ver 00.11. ]