Suchergebnisse - Blowfish cryptography algorithm

  1. 1

    Fault Detection in Blowfish Algorithm Using FPGA-Based Modified Decision Tree Approach von Prathap, Joseph Anthony, Sathiyanarayanan, Mithileysh

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2025
    Veröffentlicht in IEEE access (2025)
    “… This research article identifies the fault occurrence in the blowfish cryptography algorithm using a modified Decision Tree classifier …”
    Volltext
    Journal Article
  2. 2

    Cryptography Using Blowfish Algorithm von Sharma, Sugandha, Patel, Krishna Nand, Siddhath Jha, Aashish

    Veröffentlicht: IEEE 17.12.2021
    “… One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form …”
    Volltext
    Tagungsbericht
  3. 3

    A Random Selective Block Encryption Technique for Secure Image Cryptography Using Blowfish Algorithm von Kaur, Amandeep, Singh, Gurjeet

    Veröffentlicht: IEEE 01.04.2018
    “… The technique is proposed for image encryption and decryption with random selective selection and Blowfish algorithm the technique select refine part and encrypt decrypt block …”
    Volltext
    Tagungsbericht
  4. 4

    Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes von Bushra Jaber M.Jawad, Al-alak, Saif

    ISSN: 2788-5887, 2788-5879, 2788-5879, 2788-5887
    Veröffentlicht: College of Computer and Information Technology – University of Wasit, Iraq 30.12.2023
    Veröffentlicht in Wasit Journal of Computer and Mathematics Science (30.12.2023)
    “… In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets …”
    Volltext
    Journal Article
  5. 5

    Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish von Singh, Pankaj, Kumar, Sachin

    ISSN: 2227-524X, 2227-524X
    Veröffentlicht: 31.12.2017
    “… Cryptography is about protecting the data from third parties or from public to read confidential data …”
    Volltext
    Journal Article
  6. 6

    Securing Cloud Data: A Comprehensive Review of Hybrid Cryptography and Analysis of AES, Blowfish, and Twofish Algorithms von G, Muthu Meenakshi, S, Sabeen

    Veröffentlicht: IEEE 04.12.2024
    “… Cryptography is crucial for secure cloud computing because it addresses data security issues in shared environments, as well as the challenges that arise when companies transition from traditional …”
    Volltext
    Tagungsbericht
  7. 7

    Cryptography on Audio Files Using the Blowfish Algorithm von Fahriani, Nuniek, Waluya, Onny Kartika

    ISSN: 2528-0260, 2579-5392
    Veröffentlicht: 29.06.2018
    “… Blowfish is a 64-bit block cipher with variable key length. The algorithm consists of two part …”
    Volltext
    Journal Article
  8. 8

    Bangla and English Text Cryptography Based on Modified Blowfish and Lempel-Ziv-Welch Algorithm to Minimize Execution Time von Akhter, Shanjidah, Chowdhury, Md. Badhan

    ISBN: 9781538680124, 1538680122
    Veröffentlicht: IEEE 01.01.2019
    “… , electronic banking, social media networks, mobile telecommunication etc. Different cryptography algorithms have been reviewed, and Blowfish and Lempel-Ziv-Welch (LZW …”
    Volltext
    Tagungsbericht
  9. 9

    Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing von Radha, S., Jeyalaksshmi, S.

    ISSN: 2661-8907, 2662-995X, 2661-8907
    Veröffentlicht: Singapore Springer Nature Singapore 01.11.2023
    Veröffentlicht in SN computer science (01.11.2023)
    “… Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL …”
    Volltext
    Journal Article
  10. 10

    Secret Multiple Share Creation with Color Images using Visual Cryptography von Karolin, M., Meyyappan, T.

    Veröffentlicht: IEEE 01.04.2019
    “… The proposed method is created to RGB images and then share1, share2 created using blowfish algorithm …”
    Volltext
    Tagungsbericht
  11. 11

    Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android von Wardoyo, Siswo, Imanullah, Zaldi, Fahrizal, Rian

    ISSN: 2302-2949, 2407-7267
    Veröffentlicht: Universitas Andalas 02.03.2016
    Veröffentlicht in Jurnal nasional teknik elektro (02.03.2016)
    “… One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption …”
    Volltext
    Journal Article
  12. 12

    Integrated ECC and Blowfish for Smartphone Security von Patel, Payal, Patel, Rajan, Patel, Nimisha

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2016
    Veröffentlicht in Procedia computer science (2016)
    “… We develop the scheme to secure the mobile data in cloud using cryptography, in which Elliptic Curve Cryptography and Blowfish algorithm are integrated to provide authentication and confidentiality …”
    Volltext
    Journal Article
  13. 13

    Blockchain-Based Access-Control System for Unused Medicine and Organ Donation Using Enhanced Hybrid Cryptography von D, Divyashree, Ravi, Chitra

    Veröffentlicht: IEEE 01.09.2023
    “… +) algorithm and the Enriched Blowfish Cryptography (EBC) algorithm. The methodology of the proposed BBAC system involves creating a decentralized database of unused …”
    Volltext
    Tagungsbericht
  14. 14

    An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application von C, Naveen Rahite, K, Manoj Senthil

    ISSN: 2473-7674
    Veröffentlicht: IEEE 06.07.2023
    “… Through this paper we comprehensively analyzes and survey the Blowfish, DES, AES, and other algorithms exploring its design principles, encryption process, security analysis, and practical implementations …”
    Volltext
    Tagungsbericht
  15. 15

    Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android von Wardoyo, Siswo, Imanullah, Zaldi, Fahrizal, Rian

    ISSN: 2302-2949, 2407-7267
    Veröffentlicht: Universitas Andalas 02.03.2016
    Veröffentlicht in Jurnal nasional teknik elektro (02.03.2016)
    “… One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption …”
    Volltext
    Journal Article
  16. 16

    EnBFCrypt: Enhanced Blowfish based Cryptography with Optimal S-Box Selection for Secure Data Sharing von A, Lavanya, B, Rajakumar, D, Anita Daniel, R, Surendran

    Veröffentlicht: IEEE 12.03.2025
    “… This research introduces novel enhanced blowfish cryptography (EnBF_Crypt) algorithm for secure data sharing …”
    Volltext
    Tagungsbericht
  17. 17

    Combination of Blowfish Algorithm First of File Algorithm and End of File Algorithm on Image Security von Rachmawati, Dian, Budiman, Mohammad Andri, Fattahurrahman H N, M

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.06.2019
    Veröffentlicht in Journal of physics. Conference series (01.06.2019)
    “… In this study, the Blowfish Algorithm was combined with First Of File and End Of File steganography methods …”
    Volltext
    Journal Article
  18. 18

    Enhancing Blowfish file encryption algorithm through parallel computing on GPU von Mahajan, Tejal, Masih, Shraddha

    Veröffentlicht: IEEE 01.09.2015
    “… Purpose of parallel implementation of Blowfish cryptography algorithm is to improve the speed up of encryption and decryption so that large files also can be communicated on the network in secure and efficient way …”
    Volltext
    Tagungsbericht
  19. 19

    Blowfish-Secured Audio Steganography von Hemeida, Farah, Alexan, Wassim, Mamdouh, Salma

    Veröffentlicht: IEEE 01.10.2019
    “… The Blowfish algorithm is used for cryptography and the LSB coding technique is used for steganography …”
    Volltext
    Tagungsbericht
  20. 20

    A High Capacity Gray Code Based Security Scheme for Non-Redundant Data Embedding von Seif, Ahmed, Alexan, Wassim

    Veröffentlicht: IEEE 01.02.2020
    “… The Blowfish algorithm was chosen for the cryptography layer, while an enhanced steganography technique was used for the steganography layer …”
    Volltext
    Tagungsbericht