3SCHNEIER B. Description of a new variable-length key,64 bit block cipher (Blowfish) [ C ]//Proc of FastSoftware Encryption, the Cambridge Security Workshop. London : Springer-Verlag, 1994 : 191-204. 被引量:1
4MANZANARES A I,SIERRA C J M, MARQUEZ J T. On the implementation of security policies with adaptative encryption [J]. Computer Communications ,2006,29 ( 2 ) :2750-2758. 被引量:1
5HARRIS S, ADAMS C. Key-dependent S-box manipulations [ C ]// Proc of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:631-632. 被引量:1
6SCHNEIER B. The Blowfish encryption algorithm[ EB/OL]. (1995- 09 ). http ://www. schneier, com/paper-blowfish-oneyear, html. 被引量:1
7BIRYUKOV A, WAGNER D. Slide attacks [ C ]//Proc of FastSoftware Encryption. Berlin : Springer-Verlag, 1999:245- 259. 被引量:1
8NAKAHARA J. A linear analysis of Blowfish and Khufu [ C ]//Proc of Information Security Practice and Experience. Berlin : Springer-Verlag, 2007 : 20- 32. 被引量:1
9VAUDENAY S. On the weak keys of Blowfish[ C]//Proc of the 3rd International Workshop on FastSoftware Encryption. London:SpringerVerlag, 1996 : 27- 32. 被引量:1
10KARA O, MANAP C. A new class of weak keys for Blowfish [ C ]// Proc of FastSoftware Encryption. Berlin: Springer-Verlag, 2007 : 167- 180. 被引量:1