On the Power of Bitslice Implementation on Intel Core2 Processor
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Non-randomness in eSTREAM candidates salsa20 and TSC-4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
The Poly1305-AES message-authentication code
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Fast and secure laptop backups with encrypted de-duplication
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Cross-application data provenance and policy enforcement
ACM Transactions on Information and System Security (TISSEC)
The differential analysis of S-functions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
The additive differential probability of ARX
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Latin dances revisited: new analytic results of Salsa20 and ChaCha
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A critique of some chaotic-map and cellular automata-based stream ciphers
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
DaWaK'12 Proceedings of the 14th international conference on Data Warehousing and Knowledge Discovery
The security impact of a new cryptographic library
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
UNAF: a special set of additive differences with application to the differential analysis of ARX
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
PRINCE: a low-latency block cipher for pervasive computing applications
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Differential attacks against stream cipher ZUC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
McBits: fast constant-time code-based cryptography
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications. The reduced-round ciphers Salsa20/12 and Salsa20/8 are among the fastest 256-bit stream ciphers available and are recommended for applications where speed is more important than confidence. The fastest known attacks use ≈ 2153simple operations against Salsa20/7, ≈ 2249simple operations against Salsa20/8, and ≈ 2255simple operations against Salsa20/9, Salsa20/10, etc. In this paper, the Salsa20 designer presents Salsa20 and discusses the decisions made in the Salsa20 design.