Salsa20

From MaRDI portal
Software:18299



swMATH6165MaRDI QIDQ18299


No author found.





Related Items (47)

Analysis of variability and degree of non-linearity of HC-128Thinking outside the superboxVariants of Wegman-Carter message authentication code supporting variable tag lengthsOn the resilience of Even-Mansour to invariant permutationsCASca:A CA Based Scalable Stream CipherExtracts from the SHA-3 CompetitionThe Security Impact of a New Cryptographic LibraryParallel Implementations of LEAA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisEfficient schemes for committing authenticated encryptionMaD2: An Ultra-Performance Stream Cipher for Pervasive Data EncryptionSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyOne Word/Cycle HC-128 Accelerator via State-Splitting OptimizationTweetNaCl: A Crypto Library in 100 TweetsThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersRotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to ChaskeyA bit-vector differential model for the modular addition by a constantOn the Salsa20 Core FunctionNew Features of Latin Dances: Analysis of Salsa, ChaCha, and RumbaThe hash function \texttt{BLAKE}MemShield: GPU-assisted software memory encryptionProposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECKUnnamed ItemBricklayer attack: a side-channel analysis on the ChaCha quarter roundThe Additive Differential Probability of ARXPRINCE – A Low-Latency Block Cipher for Pervasive Computing ApplicationsDifferential Attacks against Stream Cipher ZUCNew Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUsCryptanalysis of \texttt{NORX} v2.0Slidex attacks on the Even-Mansour encryption schemeAn observation on NORX, BLAKE2, and ChaChaArithmetic Addition over Boolean MaskingEfficient cryptography on the RISC-V architectureComputing AES related-key differential characteristics with constraint programmingNon-randomness in eSTREAM Candidates Salsa20 and TSC-4Improved differential-linear attacks with applications to ARX ciphersThe Differential Analysis of S-FunctionsAutomatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEAAutomatic Search of Linear Trails in ARX with Applications to SPECK and ChaskeyWhen lagged Fibonacci generators jumpSlid Pairs in Salsa20 and TriviumA matrix PRNG with s-box output filteringA white-box speck implementation using self-equivalence encodingsImproved differential-linear attack with application to round-reduced Speck32/64Improved differential-linear attacks with applications to ARX ciphersThe Complexity of Public-Key CryptographyAlgorithms in HElib


This page was built for software: Salsa20