Salsa20
The Salsa20 encryption function, also known as Snuffle 2005, uses the Salsa20 core to encrypt data.
Keywords for this software
References in zbMATH (referenced in 39 articles )
Showing results 1 to 20 of 39.
Sorted by year (- Bordes, Nicolas; Daemen, Joan; Kuijsters, Daniël; Van Assche, Gilles: Thinking outside the superbox (2021)
- Ghosh, Sebati; Sarkar, Palash: Variants of Wegman-Carter message authentication code supporting variable tag lengths (2021)
- Kumar, Arvind; Mishra, P. R.; Pal, S. K.; Ojjela, Odelu: Analysis of variability and degree of non-linearity of HC-128 (2021)
- Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
- Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour: Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (2021)
- Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
- Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
- Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
- Chetry, Moon K.; Bishoi, Susil Kumar; Matyas, Vashek: When lagged Fibonacci generators jump (2019)
- Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
- Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
- Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
- Barak, Boaz: The complexity of public-key cryptography (2017)
- Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
- Song, Ling; Huang, Zhangjie; Yang, Qianqian: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA (2016)
- Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
- Bernstein, Daniel J.; van Gastel, Bernard; Janssen, Wesley; Lange, Tanja; Schwabe, Peter; Smetsers, Sjaak: TweetNaCl: a crypto library in 100 tweets (2015)
- Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Slidex attacks on the Even-Mansour encryption scheme (2015)
- Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
- Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)