Cited in
(77)- CryptDances
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- A fast pseudorandom number generator with BLAKE hash function
- Analysis of Diagonal Constants in Salsa
- Fruit
- Linearization framework for collision attacks: application to CubeHash and MD6
- A white-box speck implementation using self-equivalence encodings
- Arithmetic Addition over Boolean Masking
- A theoretical investigation on the distinguishers of Salsa and ChaCha
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Chaskey
- XooTools
- Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings
- On the resilience of Even-Mansour to invariant permutations
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Revamped differential-linear cryptanalysis on reduced round ChaCha
- libsodium
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Efficient cryptography on the RISC-V architecture
- The hash function \texttt{BLAKE}
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- Single-trace side-channel analysis on polynomial-based MAC schemes
- Proving the biases of Salsa and ChaCha in differential attack
- Quantum search for scaled hash function preimages
- Max-AO
- Salsa20
- CubeHash
- Rumba20
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Rabbit
- ARXtools
- NOEKEON
- Keccak
- SipHash
- SOSEMANUK
- BLAKE
- eSTREAM
- CBEAM
- SNOW
- Skein Hash
- SAFER
- CHAM
- LEA
- Fortuna
- Poly1305-AES
- tuftests
- DLCT
- deep_speck
- SPECK
- TEA
- Kyber
- XTEA
- Cryptkeeper
- TRESOR
- Adaptively code-correlation robustness functions and its applications to private set intersection
- On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
- Differential and invertibility properties of BLAKE
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Efficient schemes for committing authenticated encryption
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Slid Pairs in Salsa20 and Trivium
- An observation on NORX, BLAKE2, and ChaCha
- maskVerif
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Random numbers and computers
- Collisions for variants of the BLAKE hash function
- The design and evolution of OCB
- On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
- MemShield: GPU-assisted software memory encryption
- Algorithms in HElib
- Cryptanalysis of \texttt{NORX} v2.0
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy
- Improved analysis for reduced round Salsa and ChaCha
- Partition oracles from weak key forgeries
- Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha
This page was built for software: ChaCha