Salsa20
From MaRDI portal
Software:18299
No author found.
Related Items (47)
Analysis of variability and degree of non-linearity of HC-128 ⋮ Thinking outside the superbox ⋮ Variants of Wegman-Carter message authentication code supporting variable tag lengths ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ Extracts from the SHA-3 Competition ⋮ The Security Impact of a New Cryptographic Library ⋮ Parallel Implementations of LEA ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Efficient schemes for committing authenticated encryption ⋮ MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption ⋮ Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography ⋮ One Word/Cycle HC-128 Accelerator via State-Splitting Optimization ⋮ TweetNaCl: A Crypto Library in 100 Tweets ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey ⋮ A bit-vector differential model for the modular addition by a constant ⋮ On the Salsa20 Core Function ⋮ New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba ⋮ The hash function \texttt{BLAKE} ⋮ MemShield: GPU-assisted software memory encryption ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Unnamed Item ⋮ Bricklayer attack: a side-channel analysis on the ChaCha quarter round ⋮ The Additive Differential Probability of ARX ⋮ PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications ⋮ Differential Attacks against Stream Cipher ZUC ⋮ New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Arithmetic Addition over Boolean Masking ⋮ Efficient cryptography on the RISC-V architecture ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ The Differential Analysis of S-Functions ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey ⋮ When lagged Fibonacci generators jump ⋮ Slid Pairs in Salsa20 and Trivium ⋮ A matrix PRNG with s-box output filtering ⋮ A white-box speck implementation using self-equivalence encodings ⋮ Improved differential-linear attack with application to round-reduced Speck32/64 ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ The Complexity of Public-Key Cryptography ⋮ Algorithms in HElib
This page was built for software: Salsa20