Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
139 | T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi |
DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. |
Asia-Pacific Computer Systems Architecture Conference |
2005 |
DBLP DOI BibTeX RDF |
Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration |
129 | Brian Cody, Justin Madigan, Spencer MacDonald, Kenneth W. Hsu |
High speed SOC design for blowfish cryptographic algorithm. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
77 | Jorge Nakahara Jr. |
A Linear Analysis of Blowfish and Khufu. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis |
46 | Yeong-Kang Lai, Yu-Chuan Shu |
VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation. |
ISCAS (4) |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin |
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. |
PerCom |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Sandy Harris, Carlisle M. Adams |
Key-Dependent S-Box Manipulations. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
25 | S. Radha, S. Jeyalaksshmi |
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing. |
SN Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sunil Kumar, Dilip Kumar 0006, Naini Singh |
Performance and security analysis using B-128 modified blowfish algorithm. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sunil Kumar, Dilip Kumar |
Performance evaluation and design of B-128 modified Blowfish algorithm. |
Secur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Ch. Chakradhara Rao, Tryambak Hiwarkar, B. Santhosh Kumar |
Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm. |
J. Control. Decis. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Naveen Rahite C, Manoj Senthil K |
An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef |
Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. |
J. Cloud Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | S. Immaculate Shyla, S. S. Sujatha |
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. |
J. Ambient Intell. Humaniz. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Swati Kumari |
Enhancing the Quantum Communication Channel Using a Novel Quantum Binary Salt Blowfish Strategy. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail |
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. |
Int. J. Commun. Networks Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou |
A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy. |
IEEE Trans. Inf. Theory |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Pradeep Kumar 0010, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, Cioca Adriana Lavinia |
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Abidemi Adeniyi, Sanjay Misra, Eniola Daniel, Bokolo Anthony Jr. |
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. |
Algorithms |
2022 |
DBLP DOI BibTeX RDF |
|
25 | S. Divya, K. V. Prema, Balachandra Muniyal |
Modified Blowfish Encryption Algorithm for Wireless Body Area Network. |
ATIS |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie |
Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. |
EIT |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler |
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. |
AINA (2) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | |
Implementation of enhanced blowfish algorithm in cloud environment. |
J. Ambient Intell. Humaniz. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Majed AlOtaibi 0002 |
Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Syed Zeeshan Abbas, Haroon Ibrahim, Majid Khan |
A hybrid chaotic blowfish encryption for high-resolution satellite imagery. |
Multim. Tools Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | E. Dinesh, S. M. Ramesh |
Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment. |
J. Circuits Syst. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Jiaxiang Liu, Karl Knopf, Yiqing Tan, Bolin Ding, Xi He 0001 |
Catch a Blowfish Alive: A Demonstration of Policy-Aware Differential Privacy for Interactive Data Exploration. (PDF / PS) |
Proc. VLDB Endow. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Elie Chicha, Bechara al Bouna, Mohamed Nassar 0001, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah 0002, Djamal Benslimane, Mansour Naser Alraja |
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. |
ACM Trans. Internet Techn. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. |
ICIT |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Tobias Edwards, Benjamin I. P. Rubinstein, Zuhe Zhang, Sanming Zhou |
A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish Privacy. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Mohamed Nassar 0001, Elie Chicha, Bechara al Bouna, Richard Chbeir |
VIP Blowfish Privacy in Communication Graphs. |
ICETE (2) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Rafidah Ahmad, Daniel C. K. Kho, Asrulnizam Bin Abd Manaf, Widad Ismail |
Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission. |
Wirel. Pers. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Elza Jintcharadze, Maksim Iavich |
Public-Key hybrid cryptosystem based on Blowfish and RSA. |
IVUS |
2019 |
DBLP BibTeX RDF |
|
25 | Noah Oluwatobi Akande, Christiana Oluwakemi Abikoye, Marion Olubunmi Adebiyi, Anthonia Aderonke Kayode, Adekanmi Adeyinka Adegun, Roseline Oluwaseun Ogundokun |
Electronic Medical Information Encryption Using Modified Blowfish Algorithm. |
ICCSA (5) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Wassim Alexan, Farah Hemeida |
Security Through Blowfish and LSB Bit-Cycling With Mathematical Sequences. |
SPA |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ariel Roy L. Reyes, Enrique D. Festijo, Ruji P. Medina |
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. |
Int. J. Commun. Networks Inf. Secur. |
2018 |
DBLP BibTeX RDF |
|
25 | Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina |
A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm. |
ICNCC |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina |
Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing. |
ICIT |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Irfan A. Landge, B. K. Mishra |
Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. |
CICBA (1) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | K. Janakiraman, T. Baghyasree, D. Parkavi |
Highly secure data transmission for industrial network using blowfish algorithm in embedded processors. |
Int. J. Adv. Intell. Paradigms |
2016 |
DBLP DOI BibTeX RDF |
|
25 | P. Dileep Kumar Reddy, R. Praveen Sam, Shoba Bindu Chigarepalli |
Optimal blowfish algorithm-based technique for data security in cloud. |
Int. J. Bus. Intell. Data Min. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Anurag Khandelwal, Rachit Agarwal 0001, Ion Stoica |
BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores. |
NSDI |
2016 |
DBLP BibTeX RDF |
|
25 | Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman |
Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. |
NSysS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Kapil Earanky, Haytham Elmiligi, Musfiq Rahman |
GPU-acceleration of blowfish cryptographic algorithm. |
PACRIM |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Spencer Davis, Brandon Jones, Hai Jiang 0003 |
Portable parallelized blowfish via RenderScript. |
SNPD |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Samuel Haney, Ashwin Machanavajjhala, Bolin Ding |
Answering Query Workloads with Optimal Error under Blowfish Privacy. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
25 | Swagata Roy Chatterjee, Soham Majumder, Bodhisatta Pramanik, Mohuya Chakraborty |
FPGA Implementation of Pipelined Blowfish Algorithm. |
ISED |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xi He 0001, Ashwin Machanavajjhala, Bolin Ding |
Blowfish privacy: tuning privacy-utility trade-offs using policies. |
SIGMOD Conference |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xi He 0001, Ashwin Machanavajjhala, Bolin Ding |
Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
25 | Christophe De Cannière |
Blowfish. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | P. Karthigaikumar, K. Baskaran |
Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. |
Int. J. Image Graph. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | P. Karthigaikumar, K. Baskaran |
An ASIC implementation of low power and high throughput blowfish crypto algorithm. |
Microelectron. J. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Kiavash Bahreini |
Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. |
Security and Management |
2008 |
DBLP BibTeX RDF |
|
25 | Mark White, Tai-Chi Lee, Michael Gubody |
Blowfish Encryption/Decryption Using FPGA and Custom Instructions. |
PDPTA |
2008 |
DBLP BibTeX RDF |
|
25 | Christophe De Cannière |
Blowfish. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dieter Schmidt |
Kaweichel, an Extension of Blowfish for 64-Bit Architectures. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
25 | |
On the Key Schedule of Blowfish. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
25 | Michael C.-J. Lin, Youn-Long Lin |
A VLSI implementation of the blowfish encryption/decryption algorithm. |
ASP-DAC |
2000 |
DBLP DOI BibTeX RDF |
|
25 | João M. S. Alcântara, Sergio C. Salomão, Edson do Prado Granja, Vladimir Castro Alves, Felipe M. G. França |
Synchronous to Asynchronous Conversion - A Case Study: the Blowfish Algorithm Implementation. |
VLSI |
1999 |
DBLP BibTeX RDF |
|
25 | Serge Vaudenay |
On the Weak Keys of Blowfish. |
FSE |
1996 |
DBLP DOI BibTeX RDF |
|
25 | Bruce Schneier |
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). |
FSE |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Eric Whitman Smith, David L. Dill |
Automatic Formal Verification of Block Cipher Implementations. |
FMCAD |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr |
ASIP architecture exploration for efficient IPSec encryption: A case study. |
ACM Trans. Embed. Comput. Syst. |
2007 |
DBLP DOI BibTeX RDF |
computer-aided design, ADL, ASIP, IPSec |
21 | Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya |
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
21 | A. Murat Fiskiran, Ruby B. Lee |
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr |
ASIP Architecture Exploration for Efficient Ipsec Encryption: A Case Study. |
SCOPES |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Alex Biryukov, David A. Wagner 0001 |
Slide Attacks. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Stephen Charlwood, Philip James-Roxby |
Evaluation of the XC6200-series Architecture for Cryptographic Applications. |
FPL |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Schneier, Doug Whiting |
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|