ChaCha, a variant of Salsa20. ChaCha8 is a 256-bit stream cipher based on the 8-round cipher Salsa20/8. The changes from Salsa20/8 to ChaCha8 are designed to improve diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time per round. ChaCha12 and ChaCha20 are analogous modifications of the 12-round and 20-round ciphers Salsa20/12 and Salsa20/20. This paper presents the ChaCha family and explains the differences between Salsa20 and ChaCha

References in zbMATH (referenced in 28 articles , 1 standard article )

Showing results 1 to 20 of 28.
Sorted by year (citations)

1 2 next

  1. Dey, Sabyasachi; Sarkar, Santanu: Proving the biases of Salsa and ChaCha in differential attack (2020)
  2. Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
  3. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  4. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  5. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  6. Kneusel, Ronald T.: Random numbers and computers (2018)
  7. Paul, Goutam; Ray, Souvik: On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (2018)
  8. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  9. Dey, Sabyasachi; Sarkar, Santanu: Improved analysis for reduced round Salsa and ChaCha (2017)
  10. Ramesh, Dharavath; Mishra, Rahul; Edla, Damodar Reddy: Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (2017)
  11. Alekseychuk, A. N.; Konyushok, S. N.: On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers (2016)
  12. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)
  13. Imamura, Kazuya; Minematsu, Kazuhiko; Iwata, Tetsu: Integrity analysis of authenticated encryption based on stream ciphers (2016)
  14. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  15. Maitra, Subhamoy: Chosen IV cryptanalysis on reduced round \textttChaChaand \textttSalsa (2016)
  16. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  17. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)
  18. Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)
  19. Khalid, Ayesha; Paul, Goutam; Chattopadhyay, Anupam: New speed records for Salsa20 stream cipher using an autotuning framework on GPUs (2013)
  20. Aumasson, Jean-Philippe; Guo, Jian; Knellwolf, Simon; Matusiewicz, Krystian; Meier, Willi: Differential and invertibility properties of BLAKE (2010)

1 2 next