6SCHNEIER B. Description of a new variable-length key,64 bit block cipher (Blowfish) [ C ]//Proc of FastSoftware Encryption, the Cambridge Security Workshop. London : Springer-Verlag, 1994 : 191-204.
7MANZANARES A I,SIERRA C J M, MARQUEZ J T. On the implementation of security policies with adaptative encryption [J]. Computer Communications ,2006,29 ( 2 ) :2750-2758.
8HARRIS S, ADAMS C. Key-dependent S-box manipulations [ C ]// Proc of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:631-632.
9SCHNEIER B. The Blowfish encryption algorithm[ EB/OL]. (1995- 09 ). http ://www. schneier, com/paper-blowfish-oneyear, html.
10BIRYUKOV A, WAGNER D. Slide attacks [ C ]//Proc of FastSoftware Encryption. Berlin : Springer-Verlag, 1999:245- 259.