ChaCha

From MaRDI portal
Software:19156



swMATH7098MaRDI QIDQ19156


No author found.





Related Items (42)

Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}On the resilience of Even-Mansour to invariant permutationsProgress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. ProceedingsAnalysis of Diagonal Constants in SalsaSecure data storage in cloud: an e-stream cipher-based secure and dynamic updation policyPartition oracles from weak key forgeriesDifferential-linear cryptanalysis of the lightweight crytographic algorithm KNOTOn the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphersEfficient schemes for committing authenticated encryptionRevamped differential-linear cryptanalysis on reduced round ChaChaIntegrity Analysis of Authenticated Encryption Based on Stream CiphersChosen IV Statistical Analysis for Key Recovery Attacks on Stream CiphersAdaptively code-correlation robustness functions and its applications to private set intersectionDesign Strategies for ARX with Provable Bounds: Sparx and LAXQuantum search for scaled hash function preimagesProving the biases of Salsa and ChaCha in differential attackThe hash function \texttt{BLAKE}MemShield: GPU-assisted software memory encryptionThe design and evolution of OCBRandom Numbers and ComputersBricklayer attack: a side-channel analysis on the ChaCha quarter roundA fast pseudorandom number generator with BLAKE hash functionOn data complexity of distinguishing attacks versus message recovery attacks on stream ciphersDifferential and Invertibility Properties of BLAKENew Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUsCryptanalysis of \texttt{NORX} v2.0An observation on NORX, BLAKE2, and ChaChaArithmetic Addition over Boolean MaskingEfficient cryptography on the RISC-V architectureA theoretical investigation on the distinguishers of Salsa and ChaChaImproved differential-linear attacks with applications to ARX ciphersAutomatic Search of Linear Trails in ARX with Applications to SPECK and ChaskeyCollisions for variants of the BLAKE hash functionLinearization Framework for Collision Attacks: Application to CubeHash and MD6Slid Pairs in Salsa20 and TriviumNew Directions in Cryptanalysis of Self-Synchronizing Stream CiphersA white-box speck implementation using self-equivalence encodingsEvaluation of Grover's algorithm toward quantum cryptanalysis on ChaChaImproved differential-linear attacks with applications to ARX ciphersSingle-trace side-channel analysis on polynomial-based MAC schemesAlgorithms in HElibImproved analysis for reduced round Salsa and ChaCha


This page was built for software: ChaCha