Suchergebnisse - Blowfish cryptography algorithm
-
1
Fault Detection in Blowfish Algorithm Using FPGA-Based Modified Decision Tree Approach
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2025Veröffentlicht in IEEE access (2025)“… This research article identifies the fault occurrence in the blowfish cryptography algorithm using a modified Decision Tree classifier …”
Volltext
Journal Article -
2
Cryptography Using Blowfish Algorithm
Veröffentlicht: IEEE 17.12.2021Veröffentlicht in 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (17.12.2021)“… One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form …”
Volltext
Tagungsbericht -
3
A Random Selective Block Encryption Technique for Secure Image Cryptography Using Blowfish Algorithm
Veröffentlicht: IEEE 01.04.2018Veröffentlicht in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) (01.04.2018)“… The technique is proposed for image encryption and decryption with random selective selection and Blowfish algorithm the technique select refine part and encrypt decrypt block …”
Volltext
Tagungsbericht -
4
Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
ISSN: 2788-5887, 2788-5879, 2788-5879, 2788-5887Veröffentlicht: College of Computer and Information Technology – University of Wasit, Iraq 30.12.2023Veröffentlicht in Wasit Journal of Computer and Mathematics Science (30.12.2023)“… In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets …”
Volltext
Journal Article -
5
Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish
ISSN: 2227-524X, 2227-524XVeröffentlicht: 31.12.2017Veröffentlicht in International journal of engineering & technology (Dubai) (31.12.2017)“… Cryptography is about protecting the data from third parties or from public to read confidential data …”
Volltext
Journal Article -
6
Securing Cloud Data: A Comprehensive Review of Hybrid Cryptography and Analysis of AES, Blowfish, and Twofish Algorithms
Veröffentlicht: IEEE 04.12.2024Veröffentlicht in 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS) (04.12.2024)“… Cryptography is crucial for secure cloud computing because it addresses data security issues in shared environments, as well as the challenges that arise when companies transition from traditional …”
Volltext
Tagungsbericht -
7
Cryptography on Audio Files Using the Blowfish Algorithm
ISSN: 2528-0260, 2579-5392Veröffentlicht: 29.06.2018Veröffentlicht in JEECS (Journal of Electrical Engineering and Computer Sciences) (29.06.2018)“… Blowfish is a 64-bit block cipher with variable key length. The algorithm consists of two part …”
Volltext
Journal Article -
8
Bangla and English Text Cryptography Based on Modified Blowfish and Lempel-Ziv-Welch Algorithm to Minimize Execution Time
ISBN: 9781538680124, 1538680122Veröffentlicht: IEEE 01.01.2019Veröffentlicht in 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST) (01.01.2019)“… , electronic banking, social media networks, mobile telecommunication etc. Different cryptography algorithms have been reviewed, and Blowfish and Lempel-Ziv-Welch (LZW …”
Volltext
Tagungsbericht -
9
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
ISSN: 2661-8907, 2662-995X, 2661-8907Veröffentlicht: Singapore Springer Nature Singapore 01.11.2023Veröffentlicht in SN computer science (01.11.2023)“… Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL …”
Volltext
Journal Article -
10
Secret Multiple Share Creation with Color Images using Visual Cryptography
Veröffentlicht: IEEE 01.04.2019Veröffentlicht in 2019 International Conference on Communication and Signal Processing (ICCSP) (01.04.2019)“… The proposed method is created to RGB images and then share1, share2 created using blowfish algorithm …”
Volltext
Tagungsbericht -
11
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
ISSN: 2302-2949, 2407-7267Veröffentlicht: Universitas Andalas 02.03.2016Veröffentlicht in Jurnal nasional teknik elektro (02.03.2016)“… One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption …”
Volltext
Journal Article -
12
Integrated ECC and Blowfish for Smartphone Security
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2016Veröffentlicht in Procedia computer science (2016)“… We develop the scheme to secure the mobile data in cloud using cryptography, in which Elliptic Curve Cryptography and Blowfish algorithm are integrated to provide authentication and confidentiality …”
Volltext
Journal Article -
13
Blockchain-Based Access-Control System for Unused Medicine and Organ Donation Using Enhanced Hybrid Cryptography
Veröffentlicht: IEEE 01.09.2023Veröffentlicht in 2023 International Conference on Network, Multimedia and Information Technology (NMITCON) (01.09.2023)“… +) algorithm and the Enriched Blowfish Cryptography (EBC) algorithm. The methodology of the proposed BBAC system involves creating a decentralized database of unused …”
Volltext
Tagungsbericht -
14
An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application
ISSN: 2473-7674Veröffentlicht: IEEE 06.07.2023Veröffentlicht in International Conference on Computing, Communication, and Networking Technologies (Online) (06.07.2023)“… Through this paper we comprehensively analyzes and survey the Blowfish, DES, AES, and other algorithms exploring its design principles, encryption process, security analysis, and practical implementations …”
Volltext
Tagungsbericht -
15
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
ISSN: 2302-2949, 2407-7267Veröffentlicht: Universitas Andalas 02.03.2016Veröffentlicht in Jurnal nasional teknik elektro (02.03.2016)“… One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption …”
Volltext
Journal Article -
16
EnBFCrypt: Enhanced Blowfish based Cryptography with Optimal S-Box Selection for Secure Data Sharing
Veröffentlicht: IEEE 12.03.2025Veröffentlicht in 2025 7th International Conference on Intelligent Sustainable Systems (ICISS) (12.03.2025)“… This research introduces novel enhanced blowfish cryptography (EnBF_Crypt) algorithm for secure data sharing …”
Volltext
Tagungsbericht -
17
Combination of Blowfish Algorithm First of File Algorithm and End of File Algorithm on Image Security
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.06.2019Veröffentlicht in Journal of physics. Conference series (01.06.2019)“… In this study, the Blowfish Algorithm was combined with First Of File and End Of File steganography methods …”
Volltext
Journal Article -
18
Enhancing Blowfish file encryption algorithm through parallel computing on GPU
Veröffentlicht: IEEE 01.09.2015Veröffentlicht in 2015 International Conference on Computer, Communication and Control (IC4) (01.09.2015)“… Purpose of parallel implementation of Blowfish cryptography algorithm is to improve the speed up of encryption and decryption so that large files also can be communicated on the network in secure and efficient way …”
Volltext
Tagungsbericht -
19
Blowfish-Secured Audio Steganography
Veröffentlicht: IEEE 01.10.2019Veröffentlicht in 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES) (01.10.2019)“… The Blowfish algorithm is used for cryptography and the LSB coding technique is used for steganography …”
Volltext
Tagungsbericht -
20
A High Capacity Gray Code Based Security Scheme for Non-Redundant Data Embedding
Veröffentlicht: IEEE 01.02.2020Veröffentlicht in 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE) (01.02.2020)“… The Blowfish algorithm was chosen for the cryptography layer, while an enhanced steganography technique was used for the steganography layer …”
Volltext
Tagungsbericht

