DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Salsa20
Salsa20
Cs 255 (Introduction to Cryptography)
Stream Cipher Designs: a Review
Grein a New Non-Linear Cryptoprimitive
Analysis of Lightweight Stream Ciphers
Stream Ciphers – an Overview
Slid Pairs in Salsa20 and Trivium
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
The Salsa20 Family of Stream Ciphers
Efficient Implementation of Stream Ciphers on Embedded Processors
High Speed Reconfigurable Architecture for Phelix
Encrypt Medical Image Using Csalsa20 Stream Algorithm
Stream Ciphers Rivest Cipher 4 (RC4)
Cryptography 101: from Theory to Practice" That Will Be Published by Artech House in 2021
New Family of Stream Ciphers As Physically Clone- Resistant VLSI-Structures
NOCAS: a Nonlinear Cellular Automata Based Stream Cipher
New Features of Latin Dances: Analysis of Salsa, Chacha, and Rumba
Salsa20 and Chacha in Deterministic Authenticated Encryption with No Noncense
Top View
Salsa20 Specification
The Estream Project
Secure and Computationally-Efficient Cryptographic Primitive Based On
Cryptanalysis of Lightweight Cryptographic Algorithms
Correlated Keystreams in Moustique
SPARX - a Side-Channel Protected Processor for ARX-Based Cryptography
On Statistical Analysis of Synchronous Stream Ciphers
Download (161Kb)
Analysis of Lightweight Stream Ciphers
Cryptographic Properties of Boolean Functions: Recent Developments and Open Problems
A Survey and Analysis of the Image Encryption Methods
Latin Dances Revisited: New Analytic Results of Salsa20 and Chacha”
Recent Results on Stream Ciphers
Pseudo-Boolean Black-Box Optimization Methods in the Context of Divide-And-Conquer Approach to Solving Hard SAT Instances
New Features of Latin Dances: Analysis of Salsa, Chacha, and Rumba⋆
Neutrality-Based Symmetric Cryptanalysis
Symmetric Crypto in Software
Sugier Jarosław Low-Cost Hardware Implementations of Salsa20 Stream Cipher in Programmable Devices Hashed Into 64B Result Which Is Then XOR’Ed with Wi’ Values
Comparison of Hardware Performance of Selected Phase II Estream Candidates
Artificial Intelligence Ransomware Cryptanalysis
Which Estream Ciphers Have Been Broken?
Security Analysis of Chacha20-Poly1305 AEAD
Vulnerability Analysis of Salsa20 Differential Analysis and Deep Learning Analysis of Salsa20
Analysis and Design of a Stream Cipher
Stream Cipher Universal Hash Pseudorandom Function
The Salsa20 Stream Cipher for Transport Layer Security
On the Salsa20 Core Function
Response to “On the Salsa20 Core Function”
Stream Ciphers
Salsa20/8 and Salsa20/12