Blowfish

Results: 54



#Item
31Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
32Chubby Checker / Blowfish / Maurice Williams and the Zodiacs / Music / South Carolina / Hootie & the Blowfish / Danielle Howle

SCI[removed]STEREO South Carolina Soundtrack Groovin’ Tunes From & About South Carolina

Add to Reading List

Source URL: www.sciway.net

Language: English - Date: 2007-11-07 10:33:28
33Catheters / Bronchoscopy / Port / Premarket approval / Medical device / Medicine / Medical technology / Medical equipment

5 10(k) Notification Blowfish Transbronchial Micro-InfIusion Catheter JUL[removed]K) SUMMARY 5 10(k) Applicant

Add to Reading List

Source URL: www.accessdata.fda.gov

Language: English - Date: 2013-08-06 11:28:35
34Symmetric-key algorithm / Cipher / Crypt / Feistel cipher / Block cipher / Key size / RC5 / ICE / Key / Cryptography / Key management / Blowfish

American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

Add to Reading List

Source URL: www.ajer.org

Language: English - Date: 2014-07-28 18:08:04
35Advanced Encryption Standard / NetBSD / Ioctl / Blowfish / Cryptographic software / Comparison of disk encryption software / Cryptography / Disk encryption / Unix

CGD (4) NetBSD Kernel Interfaces Manual CGD (4)

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2004-02-26 15:42:39
36Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
37Skipjack / Crypt / Blowfish / SHA-2 / Feistel cipher / Stream cipher / Cryptography / Cryptographic software / National Security Agency

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50
38Golf / Pebble Beach Golf Links / Hootie & the Blowfish

Microsoft Word - 3M Celebrity Challenge Results.docx

Add to Reading List

Source URL: www.attpbgolf.com

Language: English - Date: 2014-02-10 17:11:56
39Py / Block size / Data Encryption Standard / Differential cryptanalysis / Cipher / ICE / Advanced Encryption Standard / Block ciphers / MULTI2 / Cryptography / Stream ciphers / Blowfish

© 1995 Michael Paul Johnson The Diamond2 Block Cipher

Add to Reading List

Source URL: www.cygnusproductions.com

Language: English - Date: 2007-05-23 11:40:44
40Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: tnlandforms.us

Language: English - Date: 2004-12-30 09:37:46
UPDATE