Salsa20
From MaRDI portal
Software:18299
swMATH6165MaRDI QIDQ18299FDOQ18299
Author name not available (Why is that?)
Cited In (47)
- Computing AES related-key differential characteristics with constraint programming
- On the resilience of Even-Mansour to invariant permutations
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- MemShield: GPU-assisted software memory encryption
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs
- TweetNaCl: A Crypto Library in 100 Tweets
- A matrix PRNG with s-box output filtering
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Cryptanalysis of \texttt{NORX} v2.0
- Extracts from the SHA-3 Competition
- Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- CASca:A CA Based Scalable Stream Cipher
- Thinking outside the superbox
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Arithmetic Addition over Boolean Masking
- One Word/Cycle HC-128 Accelerator via State-Splitting Optimization
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- A bit-vector differential model for the modular addition by a constant
- The Security Impact of a New Cryptographic Library
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Analysis of variability and degree of non-linearity of HC-128
- The hash function \texttt{BLAKE}
- On the Salsa20 Core Function
- Efficient cryptography on the RISC-V architecture
- Title not available (Why is that?)
- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption
- Algorithms in HElib
- Slidex attacks on the Even-Mansour encryption scheme
- Differential Attacks against Stream Cipher ZUC
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- The Additive Differential Probability of ARX
- The Complexity of Public-Key Cryptography
- Improved differential-linear attack with application to round-reduced Speck32/64
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Parallel Implementations of LEA
- Slid Pairs in Salsa20 and Trivium
- When lagged Fibonacci generators jump
- The Differential Analysis of S-Functions
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- An observation on NORX, BLAKE2, and ChaCha
- A white-box speck implementation using self-equivalence encodings
- Efficient schemes for committing authenticated encryption
This page was built for software: Salsa20