Search Results - (( programming using ecb algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item