Author:
Liu Chen,Li Chenghai,Zhao Fangzheng,Zhao Zijie,Qiao Hongyi
Reference18 articles.
1. Was Stuxnet an Act of War? Decoding a Cyberattack[M]//;Fidler;Was Stuxnet an act of war? Decoding a cyberattack,2011
2. Applied Cryptography for Cyber Security and Defense
3. Data encryption standard (DES)[M]//;Biryukov;Encyclopedia of Cryptography and Security,2005
4. Report on the Development of the Advanced Encryption Standard (AES)[J]. Journal of Research of the National Institute of Standards & Technology;Nechvatal,2001
5. Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modified Blowfish Algorithm Based on Improved Lorenz Attractor;2022 39th National Radio Science Conference (NRSC);2022-11-29
2. A Novel Design of Blowfish Algorithm for Image Security;Journal of Physics: Conference Series;2021-03-01