An observation on NORX, BLAKE2, and ChaCha
From MaRDI portal
Publication:2274480
DOI10.1016/j.ipl.2019.05.001zbMath1458.94273OpenAlexW2944183083MaRDI QIDQ2274480
Publication date: 20 September 2019
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2019.05.001
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- The block cipher companion.
- New stream cipher designs. The eSTREAM finalists
- A construction of a cipher from a single pseudorandom permutation.
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Improved analysis for reduced round Salsa and ChaCha
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- BLAKE2: Simpler, Smaller, Fast as MD5
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Analysis of NORX: Investigating Differential and Rotational Properties
- Boomerang Attacks on BLAKE-32
- The Boomerang Attacks on BLAKE and BLAKE2
- Tweaking Even-Mansour Ciphers
- On the Salsa20 Core Function
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Differential and Invertibility Properties of BLAKE
- Sponge-Based Pseudo-Random Number Generators
- Cryptanalysis of Reduced NORX
- Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha
- NORX: Parallel and Scalable AEAD
- Known-Key Distinguishers for Some Block Ciphers
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Analysis of BLAKE2
- On the Indifferentiability of the Sponge Construction
- Slid Pairs in Salsa20 and Trivium
This page was built for publication: An observation on NORX, BLAKE2, and ChaCha