Return to Article Details Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design Download Download PDF