The following pages link to ChaCha (Q19156):
Displaying 42 items.
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa} (Q284840) (← links)
- On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers (Q333554) (← links)
- The hash function \texttt{BLAKE} (Q483134) (← links)
- Collisions for variants of the BLAKE hash function (Q765485) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (Q1640423) (← links)
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round (Q1746826) (← links)
- On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (Q1752540) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- Cryptanalysis of \texttt{NORX} v2.0 (Q2010594) (← links)
- A theoretical investigation on the distinguishers of Salsa and ChaCha (Q2043369) (← links)
- A white-box speck implementation using self-equivalence encodings (Q2096645) (← links)
- Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha (Q2099636) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Partition oracles from weak key forgeries (Q2149813) (← links)
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT (Q2151298) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Revamped differential-linear cryptanalysis on reduced round ChaCha (Q2170082) (← links)
- Proving the biases of Salsa and ChaCha in differential attack (Q2200515) (← links)
- MemShield: GPU-assisted software memory encryption (Q2229416) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Efficient cryptography on the RISC-V architecture (Q2284120) (← links)
- Improved analysis for reduced round Salsa and ChaCha (Q2357133) (← links)
- Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings (Q2377605) (← links)
- Adaptively code-correlation robustness functions and its applications to private set intersection (Q2682918) (← links)
- Quantum search for scaled hash function preimages (Q2690252) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Algorithms in HElib (Q2874526) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Design Strategies for ARX with Provable Bounds: Sparx and LAX (Q2958134) (← links)
- A fast pseudorandom number generator with BLAKE hash function (Q3017399) (← links)
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers (Q3506384) (← links)
- Differential and Invertibility Properties of BLAKE (Q3577968) (← links)
- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 (Q3650714) (← links)
- Random Numbers and Computers (Q4644130) (← links)
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs (Q4924681) (← links)
- Analysis of Diagonal Constants in Salsa (Q5055963) (← links)
- Slid Pairs in Salsa20 and Trivium (Q5504605) (← links)
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers (Q5504606) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5918561) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5970775) (← links)