Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference33 articles.
1. D.J. Bernstein, The Salsa20 family of stream ciphers, in Robshaw, M.J.B., Billet, O., eds.: New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986 (Springer, 2008), pp. 84–97
2. D.J. Bernstein, ChaCha, a variant of Salsa20, in Workshop Record of SASC, vol. 8 (2008), pp. 3–5
3. D. Dinu, L. Perrin, A. Udovenko, V. Velichkov, J. Großschädl, A. Biryukov, Design strategies for ARX with provable bounds: Sparx and LAX, in Cheon, J.H., Takagi, T., eds.: Advances in Cryptology—ASIACRYPT 2016—22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4–8, 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10031 (2016), pp. 484–513
4. C. Beierle, A. Biryukov, L. Cardoso Dos Santos, J. Groszschädl, L.P. Perrin, A. Udovenko, V. Velichkov, Q. Wang, Schwaemm and Esch: lightweight authenticated encryption and hashing using the Sparkle permutation family (2019)
5. J.P. Aumasson, L. Henzen, W. Meier, R.C.W. Phan, SHA-3 proposal BLAKE. Submission to NIST 92 (2008)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献