{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:53:59Z","timestamp":1743123239231,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_45","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"567-581","source":"Crossref","is-referenced-by-count":0,"title":["Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System"],"prefix":"10.1007","author":[{"given":"Irfan A.","family":"Landge","sequence":"first","affiliation":[]},{"given":"B. K.","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"issue":"2","key":"45_CR1","first-page":"81","volume":"4","author":"SV Swathi","year":"2016","unstructured":"Swathi, S.V., Lahari, P.M., Thomas, B.A.: Encryption algorithms: a survey. Int. J. Adv. Res. Comput. Sci. Technol. 4(2), 81\u201388 (2016)","journal-title":"Int. J. Adv. Res. Comput. Sci. Technol."},{"issue":"2","key":"45_CR2","first-page":"292","volume":"2","author":"SM Seth","year":"2011","unstructured":"Seth, S.M., Mishra, R.: Comparative analysis of encryption algorithms for data communication. Int. J. Comput. Sci. Technol. 2(2), 292\u2013294 (2011)","journal-title":"Int. J. Comput. Sci. Technol."},{"issue":"1","key":"45_CR3","first-page":"656","volume":"4","author":"M Gupta","year":"2015","unstructured":"Gupta, M.: Security challenges and cryptography in embedded systems. Int. J. Comput. Sci. Technol. 4(1), 656\u2013662 (2015)","journal-title":"Int. J. Adv. Res. Sci. Eng."},{"issue":"4","key":"45_CR4","first-page":"289","volume":"9","author":"R Bhanot","year":"2015","unstructured":"Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289\u2013306 (2015)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"45_CR5","first-page":"62","volume":"17","author":"SOALFM Koko","year":"2015","unstructured":"Koko, S.O.A.L.F.M., Babiker, A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. 17(1), 62\u201369 (2015)","journal-title":"IOSR J. Comput. Eng."},{"issue":"4","key":"45_CR6","first-page":"143","volume":"1","author":"G Singh","year":"2011","unstructured":"Singh, G., Singla, A., Sandha, K.S.: Cryptography algorithm comparison for security enhancement in wireless intrusion detection system. Int. J. Multidiscipl. Res. 1(4), 143\u2013151 (2011)","journal-title":"Int. J. Multidiscipl. Res."},{"issue":"4","key":"45_CR7","first-page":"43","volume":"6","author":"R Masram","year":"2014","unstructured":"Masram, R., et al.: Analysis and comparison of symmetric key cryptographic algorithms based on various file features. Int. J. Netw. Secur. Appl. 6(4), 43\u201352 (2014)","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"45_CR8","unstructured":"Lagun, A.: Cryptographic strength of a new symmetric block cipher based on Feistel network. Czasopismo Techniczne, 68\u201380 (2013)"},{"issue":"4","key":"45_CR9","first-page":"283","volume":"3","author":"MA Mushtaque","year":"2014","unstructured":"Mushtaque, M.A., et al.: Evaluation of DES, TDES, AES, blowfish and two fish encryption algorithm: based on space complexity. Int. J. Eng. Res. Technol. (IJERT) 3(4), 283\u2013286 (2014)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"issue":"1","key":"45_CR10","first-page":"125","volume":"2","author":"SP Singh","year":"2011","unstructured":"Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125\u2013127 (2011)","journal-title":"Int. J. Comput. Sci. Commun."},{"issue":"5","key":"45_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.9790\/0661-0453339","volume":"4","author":"R Jain","year":"2012","unstructured":"Jain, R., Shrivastava, A.: Design and implementation of new encryption algorithm to enhance performance parameters. IOSR J. Comput. Eng. 4(5), 33\u201339 (2012)","journal-title":"IOSR J. Comput. Eng."},{"key":"45_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Fast Software Encryption","author":"B Schneier","year":"1994","unstructured":"Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191\u2013204. Springer, Heidelberg (1994). doi:\n10.1007\/3-540-58108-1_24"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Rizvi, S.A.M., Hussain, S.Z., Wadhwa, N.: Performance analysis of AES and TwoFish encryption schemes. In: 2011 International Conference on Communication Systems and Network Technologies (CSNT), pp. 76\u201379. IEEE (2011)","DOI":"10.1109\/CSNT.2011.160"},{"issue":"11","key":"45_CR14","first-page":"4744","volume":"4","author":"DD Rane","year":"2016","unstructured":"Rane, D.D.: Superiority of Twofish over Blowfish. Int. J. Sci. Res. Manage. 4(11), 4744\u20134746 (2016)","journal-title":"Int. J. Sci. Res. Manage."},{"key":"45_CR15","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit Block Cipher, NIST AES proposal, 15 June 1998"},{"issue":"4","key":"45_CR16","first-page":"76","volume":"2","author":"MA Mushtaque","year":"2014","unstructured":"Mushtaque, M.A.: Comparative analysis on different parameters of encryption algorithms for information security. Int. J. Comput. Sci. 2(4), 76\u201382 (2014)","journal-title":"Int. J. Comput. Sci."},{"issue":"8","key":"45_CR17","first-page":"104","volume":"5","author":"M Rani","year":"2015","unstructured":"Rani, M., Kumar, D.S.: Analysis on different parameters of encryption algorithms for information security. Int. J. Adv. Res. Comput. Sci. Soft. Eng. 5(8), 104\u2013108 (2015)","journal-title":"Int. J. Adv. Res. Comput. Sci. Soft. Eng."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T01:37:54Z","timestamp":1517189874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}