ChaCha
ChaCha, a variant of Salsa20. ChaCha8 is a 256-bit stream cipher based on the 8-round cipher Salsa20/8. The changes from Salsa20/8 to ChaCha8 are designed to improve diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time per round. ChaCha12 and ChaCha20 are analogous modifications of the 12-round and 20-round ciphers Salsa20/12 and Salsa20/20. This paper presents the ChaCha family and explains the differences between Salsa20 and ChaCha
Keywords for this software
References in zbMATH (referenced in 28 articles , 1 standard article )
Showing results 1 to 20 of 28.
Sorted by year (- Dey, Sabyasachi; Sarkar, Santanu: Proving the biases of Salsa and ChaCha in differential attack (2020)
- Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
- Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
- Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
- Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
- Kneusel, Ronald T.: Random numbers and computers (2018)
- Paul, Goutam; Ray, Souvik: On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (2018)
- Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
- Dey, Sabyasachi; Sarkar, Santanu: Improved analysis for reduced round Salsa and ChaCha (2017)
- Ramesh, Dharavath; Mishra, Rahul; Edla, Damodar Reddy: Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (2017)
- Alekseychuk, A. N.; Konyushok, S. N.: On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers (2016)
- Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)
- Imamura, Kazuya; Minematsu, Kazuhiko; Iwata, Tetsu: Integrity analysis of authenticated encryption based on stream ciphers (2016)
- Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
- Maitra, Subhamoy: Chosen IV cryptanalysis on reduced round \textttChaChaand \textttSalsa (2016)
- Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
- Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)
- Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)
- Khalid, Ayesha; Paul, Goutam; Chattopadhyay, Anupam: New speed records for Salsa20 stream cipher using an autotuning framework on GPUs (2013)
- Aumasson, Jean-Philippe; Guo, Jian; Knellwolf, Simon; Matusiewicz, Krystian; Meier, Willi: Differential and invertibility properties of BLAKE (2010)