Skip to main content

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Biryukov, A. and D. Wagner (1999). “Slide attacks.” Proceedings of Fast Software Encryption—FSE'99, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 245–259.

    Google Scholar 

  2. Rijmen, V. (1997). “Cryptanalysis and Design of Iterated Block Ciphers.” PhD Thesis, Katholieke Universiteit Leuven.

    Google Scholar 

  3. Schneier, B. (1994). “Description of a new variable-length key, 64-bit block cipher (Blowfish).” Fast Software Encryption, FSE'93, Lecture Notes in Computer Science, vol. 809, ed. R.J. Anderson. Springer-Verlag, Berlin, 191–204.

    Google Scholar 

  4. Vaudenay, S. (1996). “On the weak keys of Blowfish.” Fast Software Encryption, FSE'96, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollmann. Springer-Verlag, Berlin, 27–32.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

De Cannière, C. (2005). Blowfish. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_34

Download citation

Publish with us

Policies and ethics