|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 25 keywords
|
|
|
Results
Found 50 publication records. Showing 50 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
214 | Eli Biham, Vladimir Furman |
Improved Impossible Differentials on Twofish. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Twofish, cryptanalysis, impossible differential |
106 | Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Chris Hall |
On the Twofish Key Schedule. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
70 | Helger Lipmaa |
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
differential probability, Pseudo-Hadamard Transform, Twofish, linear functions |
67 | Stefan Lucks |
The Saturation Attack - A Bait for Twofish. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri |
Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks |
39 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. |
FPGA |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
28 | Maddila Suresh Kumar, Vadlamani Nagalakshmi |
A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud. |
J. Inf. Knowl. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Pramod Singh Rathore, Mrinal Kanti Sarkar |
Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis. |
CCWC |
2024 |
DBLP DOI BibTeX RDF |
|
28 | A. Jenice Prabhu, S. Vallisree, S. N. Kumar, Ramachandran Sitharthan, M. Rajesh 0001, A. Ahilan, M. Usha |
Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing. |
FICTA (2) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Gabriela Mogos |
Quantum Biometric Fingerprint Encryption based on Twofish Algorithm. |
ISOCC |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. |
Int. J. Commun. Networks Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tanveer ul Haq, Tariq Shah, Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Ibrahim A. Hameed, Huma Jamil |
Improved Twofish Algorithm: A Digital Image Enciphering Application. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. |
ICIT |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Suhad Muhajer Kareem, Abdul Monem S. Rahma |
A novel approach for the development of the Twofish algorithm based on multi-level key space. |
J. Inf. Secur. Appl. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Elza Jintcharadze, Maksim Iavich |
Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. |
EWDTS |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Rolou Lyn Rodriguez Maata, Ronald S. Cordova, Alrence Halibas |
Performance Analysis of Twofish Cryptography Algorithm in Big Data. |
ICSIE |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad 0001, Muder Almiani, Raouf M. Ganda, Ahmed Oun |
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. |
IoTSMS |
2019 |
DBLP DOI BibTeX RDF |
|
28 | David Smekal, Jan Hajny, Zdenek Martinasek |
Hardware-Accelerated Twofish Core for FPGA. |
TSP |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Chujiao Ma, John A. Chandy, Zhijie Shi |
Algebraic Side-Channel Attack on Twofish. |
J. Internet Serv. Inf. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Irfan A. Landge, B. K. Mishra |
Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. |
CICBA (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jose Javier Gonzalez Ortiz, Kevin J. Compton |
A Simple Power Analysis Attack on the Twofish Key Schedule. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
28 | Pablo Freyre, Nelson Díaz, Oristela Cuellar |
Variations to the Cryptographics Algorithms AES and Twofish. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Uli Kretzschmar, Armando Astarloa, Jesús Lázaro 0001 |
SEU Resilience of DES, AES and Twofish in SRAM-Based FPGA. |
ARC |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Sohaib Majzoub, Hassan B. Diab |
MorphoSys reconfigurable hardware for cryptography: the twofish case. |
J. Supercomput. |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Subidh Ali, Debdeep Mukhopadhyay |
Differential Fault Analysis of Twofish. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Christophe De Cannière |
TWOFISH. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Seon-Keun Lee, Sun-Yeob Kim, Yoo-Chan Ra |
A Study on the Twofish Security Processor Design Using USB Interface Device. |
ICHIT (2) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Christophe De Cannière |
Twofish. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Choong-Mo Youn, Beom-Geun Lee |
High-speed Hardware Design for the Twofish Encryption Algorithm. |
J. Inform. and Commun. Convergence Engineering |
2005 |
DBLP BibTeX RDF |
|
28 | Marco Macchetti |
Characteristics of Key-Dependent S-Boxes: the Case of Twofish. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
28 | Gianluca Catalini, Franco Chiaraluce, Lorenzo Ciccarelli, Ennio Gambi, Paola Pierleoni, Maurizio Reginelli |
Modified twofish algorithm for increasing security and efficiency in the encryption of video signals. |
ICIP (1) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Stefan Lucks |
The Saturation Attack - a Bait for Twofish. |
IACR Cryptol. ePrint Arch. |
2000 |
DBLP BibTeX RDF |
|
28 | Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Niels Ferguson |
Comments on Twofish as an AES Candidate. |
AES Candidate Conference |
2000 |
DBLP BibTeX RDF |
|
28 | Bruce Schneier, Doug Whiting |
Twofish on Smart Cards. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stefan Tillich, Johann Großschädl |
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
19 | Sohaib Majzoub, Hassan B. Diab |
Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable Platform. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. |
LPAR |
2005 |
DBLP DOI BibTeX RDF |
|
19 | A. Murat Fiskiran, Ruby B. Lee |
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 |
On the Additive Differential Probability of Exclusive-Or. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Additive differential probability, differential cryptanalysis, rational series |
19 | Gregory G. Rose, Philip Hawkes |
Turing: A Fast Stream Cipher. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno |
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
authentication, Stream cipher, encryption, MAC |
19 | Helger Lipmaa |
Fast Software Implementations of SC2000. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Block cipher design, large S-boxes, SC2000, fast implementation |
19 | Marcin Gomulkiewicz, Miroslaw Kutylowski |
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware |
19 | Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
A Comparative Study of Performance of AES Final Candidates Using FPGAs. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
19 | R. Reed Taylor, Seth Copen Goldstein |
A High-Performance Flexible Architecture for Cryptography. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #50 of 50 (100 per page; Change: )
|
|