{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:24:31Z","timestamp":1766579071852,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319715001"},{"type":"electronic","value":"9783319715018"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71501-8_6","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:46:46Z","timestamp":1511250406000},"page":"93-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Diagonal Constants in Salsa"],"prefix":"10.1007","author":[{"given":"Bhagwan N.","family":"Bathe","sequence":"first","affiliation":[]},{"given":"Bharti","family":"Hariramani","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Bhattacharjee","sequence":"additional","affiliation":[]},{"given":"S. V.","family":"Kulgod","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Ashur, T., Liu, Y.: Rotational cryptanalysis in the presence of constants. IACR Cryptology ePrint Archive 2016, 826 (2016). http:\/\/eprint.iacr.org\/2016\/826","DOI":"10.46586\/tosc.v2016.i1.57-70"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30"},{"key":"6_CR3","unstructured":"Bernstein, D.: Salsa20 security (2005). http:\/\/cr.yp.to\/snuffle\/security.pdf"},{"key":"6_CR4","unstructured":"Bernstein, D.J.: Salsa20 specification. eSTREAM Project algorithm description (2005). http:\/\/www.ecrypt.eu.org\/stream\/salsa20pf.html"},{"key":"6_CR5","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC, vol. 8 (2008)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-540-71039-4_29","volume-title":"Fast Software Encryption","author":"JC Hernandez-Castro","year":"2008","unstructured":"Hernandez-Castro, J.C., Tapiador, J.M.E., Quisquater, J.-J.: On the Salsa20 core function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 462\u2013469. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_29"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Choudhuri, A.R., Maitra, S.: Significantly improved multi-bit differentials for reduced round salsa and chacha. IACR Cryptology ePrint Archive 2016, 1034 (2016). http:\/\/eprint.iacr.org\/2016\/1034","DOI":"10.46586\/tosc.v2016.i2.261-287"},{"key":"6_CR8","unstructured":"Crowley, P.: Truncated differential cryptanalysis of five rounds of Salsa20. IACR Cryptology ePrint Archive 2005, 375 (2005). http:\/\/eprint.iacr.org\/2005\/375"},{"key":"6_CR9","unstructured":"The ECRYPT stream cipher project. eSTREAM portfolio of stream ciphers. http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11941378_2","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"S Fischer","year":"2006","unstructured":"Fischer, S., Meier, W., Berbain, C., Biasse, J.-F., Robshaw, M.J.B.: Non-randomness in eSTREAM candidates Salsa20 and TSC-4. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 2\u201316. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11941378_2"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-25243-3_21","volume-title":"Information and Communications Security","author":"T Ishiguro","year":"2011","unstructured":"Ishiguro, T., Kiyomoto, S., Miyake, Y.: Latin dances revisited: new analytic results of Salsa20 and ChaCha. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 255\u2013266. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25243-3_21"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dam.2016.02.020","volume":"208","author":"S Maitra","year":"2016","unstructured":"Maitra, S.: Chosen IV cryptanalysis on reduced round ChaCha and Salsa. Discret. Appl. Math. 208, 88\u201397 (2016). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0166218X16300841","journal-title":"Discret. Appl. Math."},{"key":"6_CR13","unstructured":"Maitra, S., Paul, G., Meier, W.: Salsa20 cryptanalysis: new moves and revisiting old styles. In: WCC 2015, the Ninth International Workshop on Coding and Cryptography, Paris, France, 13\u201317 April 2015 (2015). http:\/\/eprint.iacr.org\/2015\/217, http:\/\/eprint.iacr.org\/2015\/217"},{"key":"6_CR14","unstructured":"Mouha, N., Preneel, B.: A proof that the ARX Cipher Salsa20 is secure against differential cryptanalysis. IACR Cryptology ePrint Archive 2013, 328 (2013). http:\/\/eprint.iacr.org\/2013\/328"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-37682-5_24","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"Z Shi","year":"2013","unstructured":"Shi, Z., Zhang, B., Feng, D., Wu, W.: Improved key recovery attacks on reduced-round Salsa20 and ChaCha. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 337\u2013351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_24"},{"key":"6_CR16","unstructured":"https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-12"},{"key":"6_CR17","unstructured":"Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T., Nakashima, H.: Differential Cryptanalysis of Salsa20\/8 (2007). http:\/\/ecrypt.eu.org\/stream\/papersdir\/2007\/010.pdf"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-34047-5_17","volume-title":"Fast Software Encryption","author":"V Velichkov","year":"2012","unstructured":"Velichkov, V., Mouha, N., De Canni\u00e8re, C., Preneel, B.: UNAF: a special set of additive differences with application to the differential analysis of ARX. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 287\u2013305. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_17"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71501-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:48:59Z","timestamp":1709819339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71501-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319715001","9783319715018"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71501-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Goa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.space.dbcegoa.ac.in\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}