ChaCha, a variant of Salsa20. ChaCha8 is a 256-bit stream cipher based on the 8-round cipher Salsa20/8. The changes from Salsa20/8 to ChaCha8 are designed to improve diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time per round. ChaCha12 and ChaCha20 are analogous modifications of the 12-round and 20-round ciphers Salsa20/12 and Salsa20/20. This paper presents the ChaCha family and explains the differences between Salsa20 and ChaCha

References in zbMATH (referenced in 31 articles , 1 standard article )

Showing results 1 to 20 of 31.
Sorted by year (citations)

1 2 next

  1. Dey, Sabyasachi; Sarkar, Santanu: A theoretical investigation on the distinguishers of Salsa and ChaCha (2021)
  2. Krovetz, Ted; Rogaway, Phillip: The design and evolution of OCB (2021)
  3. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  4. Dey, Sabyasachi; Sarkar, Santanu: Proving the biases of Salsa and ChaCha in differential attack (2020)
  5. Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
  6. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  7. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  8. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  9. Kneusel, Ronald T.: Random numbers and computers (2018)
  10. Paul, Goutam; Ray, Souvik: On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (2018)
  11. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  12. Dey, Sabyasachi; Sarkar, Santanu: Improved analysis for reduced round Salsa and ChaCha (2017)
  13. Ramesh, Dharavath; Mishra, Rahul; Edla, Damodar Reddy: Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (2017)
  14. Alekseychuk, A. N.; Konyushok, S. N.: On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers (2016)
  15. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)
  16. Imamura, Kazuya; Minematsu, Kazuhiko; Iwata, Tetsu: Integrity analysis of authenticated encryption based on stream ciphers (2016)
  17. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  18. Maitra, Subhamoy: Chosen IV cryptanalysis on reduced round \textttChaChaand \textttSalsa (2016)
  19. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  20. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)

1 2 next