References
[1]. Bhalla, J. S., & Nagrath, P. (2013). Nested digital image watermarking technique using blowfish encryption algorithm. International Journal of Scientific and Research Publications, 3(4), 1-6.
[2]. Biham, E., & Shamir, A., (1992). Differential Cryptanalysis of the Full 16-Round DES. In Annual International Cryptology Conference (pp. 487-496). (Vol. 740). Springer, Berlin, Heidelberg.
[3]. Chen, J., Xue, D., & Lai, X. (2008). An analysis of International Data Encryption Algorithm (IDEA) security against differential cryptanalysis. Wuhan University Journal of Natural Sciences, 13(6), 697-701.
[4]. Cheung, O. Y., Tsoi, K. H., Leong, P. H. W., & Leong, M. P. (2001, May). Tradeoffs in parallel and serial implementations of the International Data Encryption Algorithm (IDEA). In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 333-347). Springer, Berlin, Heidelberg.
[5]. Clavier, C., Gierlichs, B., & Verbauwhede, I. (2008, April). Fault analysis study of IDEA. In Cryptographers' Track at the RSA Conference (pp. 274-287). Springer, Berlin, Heidelberg.
[6]. Curiger, A., Bonnenberg, H., Zimmermann, R., Felber, N., Kaeslin, H., & Fichtner, W. (1993, May). VINCI: VLSI implementation of the new secret-key block cipher IDEA. In Proceedings of IEEE Custom Integrated Circuits Conference-CICC'93, IEEE. 9-12.
[7]. Demirci, H., Selçuk, A. A., & Türe, E. (2003, August). A new meet-in-the-middle attack on the IDEA block cipher. In International Workshop on Selected Areas in Cryptography (pp. 117-129). Springer, Berlin, Heidelberg.
[8]. Forouzan, B. A. (2008). Network Security. McGraw Hill (international edition).
[9]. Hellman, M. E. (1979). IDES will be totally insecure within ten years. IEEE Spectrum, 16(7), 32-40.
[10]. Nakahara, J., Preneel, B., & Vandewalle, J. (2003, October). A note on weak keys of PES, IDEA, and some extended variants. In International Conference on Information Security (pp. 267-279). Springer, Berlin, Heidelberg.
[11]. Nakahara, J., Preneel, B., & Vandewalle, J. (2004, July). The Biryukov-Demirci attack on reduced-round versions of IDEA and MESH ciphers. In Australasian Conference on Information Security and Privacy (pp. 98- 109). Springer, Berlin, Heidelberg.
[12]. NBS. (1977). Data Encryption Standard. Washington DC: FIPS.
[13]. NIST. (2012). 800-67 Revision 1, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. National Institute of Standards and Technology.
[14]. Yang, W. Z., Li, T., & Hao, L. (2004). Expanding key size of IDEA. Computer Engineering and Design, 25(11), 1903- 1904.
[15]. Yide, M. (2005). Some improvements on international data encryption algorithm in developing system. Computer Engineering and Application, 41(7), pp. 114-115.