Salsa20
From MaRDI portal
Software:18299
swMATH6165MaRDI QIDQ18299FDOQ18299
Author name not available (Why is that?)
Cited In (47)
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- An improved Salsa20 stream cipher
- Computing AES related-key differential characteristics with constraint programming
- On the resilience of Even-Mansour to invariant permutations
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- MemShield: GPU-assisted software memory encryption
- One word/cycle HC-128 accelerator via state-splitting optimization
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Differential attacks against stream cipher ZUC
- The security impact of a new cryptographic library
- TweetNaCl: A Crypto Library in 100 Tweets
- A matrix PRNG with s-box output filtering
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Cryptanalysis of \texttt{NORX} v2.0
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Thinking outside the superbox
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Arithmetic Addition over Boolean Masking
- A bit-vector differential model for the modular addition by a constant
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- Parallel implementations of LEA
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Analysis of variability and degree of non-linearity of HC-128
- The differential analysis of S-functions
- The hash function \texttt{BLAKE}
- Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography
- On the Salsa20 Core Function
- Efficient cryptography on the RISC-V architecture
- Algorithms in HElib
- Slidex attacks on the Even-Mansour encryption scheme
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- The Additive Differential Probability of ARX
- The Complexity of Public-Key Cryptography
- Improved differential-linear attack with application to round-reduced Speck32/64
- Slid Pairs in Salsa20 and Trivium
- Extracts from the SHA-3 competition
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- CASca: a CA based scalable stream cipher
- When lagged Fibonacci generators jump
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- An observation on NORX, BLAKE2, and ChaCha
- A white-box speck implementation using self-equivalence encodings
- Efficient schemes for committing authenticated encryption
This page was built for software: Salsa20