swMATH6165MaRDI QIDQ18299FDOQ18299
Author name not available (Why is that?)
Official website: http://cr.yp.to/snuffle.html#speed
Cited In (only showing first 100 items - show all)
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- CryptDances
- MessagePack
- An improved Salsa20 stream cipher
- One word/cycle HC-128 accelerator via state-splitting optimization
- Differential attacks against stream cipher ZUC
- A matrix PRNG with s-box output filtering
- Arithmetic Addition over Boolean Masking
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- Parallel implementations of LEA
- Analysis of variability and degree of non-linearity of HC-128
- The differential analysis of S-functions
- Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography
- The Additive Differential Probability of ARX
- Extracts from the SHA-3 competition
- When lagged Fibonacci generators jump
- An observation on NORX, BLAKE2, and ChaCha
- Computing AES related-key differential characteristics with constraint programming
- On the resilience of Even-Mansour to invariant permutations
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- MemShield: GPU-assisted software memory encryption
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The security impact of a new cryptographic library
- Chaskey
- TweetNaCl: A Crypto Library in 100 Tweets
- XooTools
- Saturnin
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Cryptanalysis of \texttt{NORX} v2.0
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
- Jasmin
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Thinking outside the superbox
- libsodium
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- A bit-vector differential model for the modular addition by a constant
- Max-AO
- Trivium
- ChaCha
- CubeHash
- eBASH
- Rumba20
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Rabbit
- Diehard
- HIGHT
- spongent
- AETG
- ARXtools
- eBACS
- MICKEY
- Keccak
- SipHash
- NaCl
- OpenSSL
- SOSEMANUK
- BLAKE
- eSTREAM
- NanGate
- CASca
- TweetNaCl
- SIMECK
- SIMON
- CBEAM
- MaD2
- SNOW
- Skein Hash
- SAFER
- NIST Statistical Test Suite
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- CHAM
- LEA
- YAARX
- CryptoSMT
- Poly1305-AES
- tuftests
- CryptoSAT
- DLCT
- CacheAudit
- deep_speck
- SPECK
- The hash function \texttt{BLAKE}
- TEA
- Ciminion
- Kyber
- XTEA
- Cryptkeeper
- TRESOR
- On the Salsa20 Core Function
- Efficient cryptography on the RISC-V architecture
- Algorithms in HElib
- Slidex attacks on the Even-Mansour encryption scheme
- maskVerif
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- The Complexity of Public-Key Cryptography
- Improved differential-linear attack with application to round-reduced Speck32/64
- Slid Pairs in Salsa20 and Trivium
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
This page was built for software: Salsa20