Cited in
(only showing first 100 items - show all)- CryptDances
- MessagePack
- An improved Salsa20 stream cipher
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- Arithmetic Addition over Boolean Masking
- The differential analysis of S-functions
- One word/cycle HC-128 accelerator via state-splitting optimization
- Extracts from the SHA-3 competition
- Parallel implementations of LEA
- When lagged Fibonacci generators jump
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- Analysis of variability and degree of non-linearity of HC-128
- A matrix PRNG with s-box output filtering
- The Additive Differential Probability of ARX
- An observation on NORX, BLAKE2, and ChaCha
- Differential attacks against stream cipher ZUC
- Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography
- On the Salsa20 Core Function
- A white-box speck implementation using self-equivalence encodings
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Slidex attacks on the Even-Mansour encryption scheme
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- A bit-vector differential model for the modular addition by a constant
- Computing AES related-key differential characteristics with constraint programming
- Chaskey
- XooTools
- On the resilience of Even-Mansour to invariant permutations
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- Saturnin
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- Jasmin
- The security impact of a new cryptographic library
- libsodium
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Efficient cryptography on the RISC-V architecture
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- CASca: a CA based scalable stream cipher
- The hash function \texttt{BLAKE}
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Max-AO
- Trivium
- ChaCha
- CubeHash
- eBASH
- Rumba20
- Rabbit
- Diehard
- HIGHT
- spongent
- AETG
- ARXtools
- eBACS
- MICKEY
- Keccak
- SipHash
- NaCl
- OpenSSL
- SOSEMANUK
- BLAKE
- eSTREAM
- NanGate
- CASca
- TweetNaCl
- SIMECK
- SIMON
- CBEAM
- TweetNaCl: A Crypto Library in 100 Tweets
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- MaD2
- SNOW
- Skein Hash
- SAFER
- NIST Statistical Test Suite
- CHAM
- LEA
- YAARX
- CryptoSMT
- Poly1305-AES
- tuftests
- CryptoSAT
- DLCT
- CacheAudit
- deep_speck
- SPECK
- Improved differential-linear attack with application to round-reduced Speck32/64
- TEA
- Ciminion
- Kyber
- XTEA
- Cryptkeeper
- TRESOR
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Efficient schemes for committing authenticated encryption
- Thinking outside the superbox
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Slid Pairs in Salsa20 and Trivium
- maskVerif
This page was built for software: Salsa20