A theoretical investigation on the distinguishers of Salsa and ChaCha
From MaRDI portal
Publication:2043369
DOI10.1016/J.DAM.2021.06.017zbMath1469.94092OpenAlexW3179206707MaRDI QIDQ2043369
Sabyasachi Dey, Santanu Sarkar
Publication date: 2 August 2021
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2021.06.017
Related Items (2)
Fully automated differential-linear attacks against ARX ciphers ⋮ PNB-focused differential cryptanalysis of ChaCha stream cipher
Uses Software
Cites Work
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Proving the biases of Salsa and ChaCha in differential attack
- Settling the mystery of \(Z_{r} = r\) in RC4
- Improved analysis for reduced round Salsa and ChaCha
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Full Plaintext Recovery Attack on Broadcast RC4
- Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Cryptanalysis of the Full Spritz Stream Cipher
- Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
This page was built for publication: A theoretical investigation on the distinguishers of Salsa and ChaCha