Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.

References in zbMATH (referenced in 22 articles )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Raja, S. P.: Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique (2019)
  2. Ferretti, Luca; Marchetti, Mirco; Andreolini, Mauro; Colajanni, Michele: A symmetric cryptographic scheme for data integrity verification in cloud databases (2018)
  3. Amandeep; Geetha, G.: Analysis of Bitsum attack on block ciphers (2016)
  4. Kozhevnikov, A. A.; Polikarpov, S. V.; Rumyantsev, K. E.: On differential properties of a symmetric cryptoalgorithm based on pseudo-dynamic substitutions (2016)
  5. Jawad, Lahieb Mohammed; Sulong, Ghazali: Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption (2015)
  6. Dong, Le; Wu, Wenling; Wu, Shuang; Zou, Jian: Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (2014)
  7. Wu, Yue; Zhou, Yicong; Noonan, Joseph P.; Agaian, Sos: Design of image cipher using Latin squares (2014)
  8. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)
  9. Isobe, Takanori: A single-key attack on the full GOST block cipher (2013)
  10. Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik: Differential cryptanalysis of round-reduced printcipher: computing roots of permutations (2011)
  11. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Cryptanalysis of PRESENT-like ciphers with secret S-boxes (2011)
  12. Isobe, Takanori: A single-key attack on the full GOST block cipher (2011)
  13. Kara, Orhun: Reflection cryptanalysis of some ciphers (2008)
  14. Katos, Vasilios; Doherty, Bernard: Exploring confusion in product ciphers through regression analysis (2007)
  15. De Drézigué, David; Fizaine, Jean-Paul; Hansma, Nils: In-depth analysis of the viral threats with documents. (2006) ioport
  16. Clapp, Craig S. K.: Joint hardware/software design of a fast stream cipher (1998)
  17. Moriai, Shiho; Shimoyama, Takeshi; Kaneko, Toshinobu: Higher order differential attack of a CAST cipher (1998)
  18. Clapp, Craig S. K.: Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors (1997)
  19. Schneier, Bruce; Whiting, Doug: Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor (1997)
  20. Kelsey, John; Schneier, Bruce; Wagner, David: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES (1996)

1 2 next