The following pages link to Salsa20 (Q18299):
Displaying 47 items.
- The hash function \texttt{BLAKE} (Q483134) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round (Q1746826) (← links)
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (Q1981795) (← links)
- Cryptanalysis of \texttt{NORX} v2.0 (Q2010594) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- A white-box speck implementation using self-equivalence encodings (Q2096645) (← links)
- Improved differential-linear attack with application to round-reduced Speck32/64 (Q2096647) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- MemShield: GPU-assisted software memory encryption (Q2229416) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Efficient cryptography on the RISC-V architecture (Q2284120) (← links)
- Computing AES related-key differential characteristics with constraint programming (Q2289026) (← links)
- When lagged Fibonacci generators jump (Q2322871) (← links)
- A matrix PRNG with s-box output filtering (Q2336439) (← links)
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey (Q2672454) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Algorithms in HElib (Q2874526) (← links)
- The Security Impact of a New Cryptographic Library (Q2915120) (← links)
- One Word/Cycle HC-128 Accelerator via State-Splitting Optimization (Q2945390) (← links)
- TweetNaCl: A Crypto Library in 100 Tweets (Q2946467) (← links)
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers (Q2946969) (← links)
- The Additive Differential Probability of ARX (Q3013093) (← links)
- The Differential Analysis of S-Functions (Q3084242) (← links)
- (Q3109132) (← links)
- Parallel Implementations of LEA (Q3193268) (← links)
- CASca:A CA Based Scalable Stream Cipher (Q3449411) (← links)
- Extracts from the SHA-3 Competition (Q3455489) (← links)
- On the Salsa20 Core Function (Q3525695) (← links)
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba (Q3525696) (← links)
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Q4911587) (← links)
- Differential Attacks against Stream Cipher ZUC (Q4911590) (← links)
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs (Q4924681) (← links)
- The Complexity of Public-Key Cryptography (Q5021130) (← links)
- Analysis of variability and degree of non-linearity of HC-128 (Q5035078) (← links)
- Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography (Q5086199) (← links)
- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption (Q5327302) (← links)
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 (Q5458262) (← links)
- Slid Pairs in Salsa20 and Trivium (Q5504605) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5918561) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5970775) (← links)