{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:10:37Z","timestamp":1765113037632,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology, India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10623-024-01522-7","type":"journal-article","created":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T09:34:18Z","timestamp":1731144858000},"page":"243-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved key recovery attacks on reduced-round Salsa20"],"prefix":"10.1007","volume":"93","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-4646","authenticated-orcid":false,"given":"Sabyasachi","family":"Dey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2579-8587","authenticated-orcid":false,"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-7697","authenticated-orcid":false,"given":"Nitin Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,9]]},"reference":[{"key":"1522_CR1","doi-asserted-by":"publisher","unstructured":"Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.: New features of Latin dances: analysis of Salsa20, ChaCha and Rumba. In: FSE 2008, Revised Selected Papers. LNCS, vol. 5086, pp. 470\u2013488. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30.","DOI":"10.1007\/978-3-540-71039-4_30"},{"key":"1522_CR2","unstructured":"Bernstein D.J. : Salsa20\/8 and Salsa20\/12. Technical Report 2005\/025, eSTREAM, ECRYPT Stream Cipher Project (2005). https:\/\/cr.yp.to\/snuffle\/812.pdf."},{"key":"1522_CR3","unstructured":"Bernstein D.J. Salsa20. Technical Report 2005\/025, eSTREAM, ECRYPT Stream Cipher Project (2005). https:\/\/www.ecrypt.eu.org\/stream\/papers.html."},{"key":"1522_CR4","doi-asserted-by":"publisher","unstructured":"Bernstein D.J.: The Salsa20 family of stream ciphers. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs\u2014The eSTREAM Finalists, LNCS, vol. 4986, pp. 84\u201397. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_8.","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"1522_CR5","doi-asserted-by":"publisher","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes A., Vanstone S.A. (eds.) CRYPTO. Lecture Notes in Computer Science, vol. 537, pp. 2\u201321. Springer, Berlin (1990). https:\/\/doi.org\/10.1007\/3-540-38424-3_1.","DOI":"10.1007\/3-540-38424-3_1"},{"key":"1522_CR6","doi-asserted-by":"publisher","unstructured":"Choudhuri A.R., Maitra S.: Significantly improved multi-bit differentials for reduced round Salsa20 and ChaCha. IACR Trans. Symmetric Cryptol. (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i2.261-287.","DOI":"10.13154\/tosc.v2016.i2.261-287"},{"key":"1522_CR7","unstructured":"Crowley P.: Truncated differential cryptanalysis of five rounds of Salsa20. In: SASC 2006\u2014Stream Ciphers Revisited (2006). http:\/\/eprint.iacr.org\/2005\/375."},{"key":"1522_CR8","doi-asserted-by":"publisher","unstructured":"Deepthi K., Singh K.: Cryptanalysis of Salsa20 and ChaCha: revisited. In: International Conference on Mobile Networks and Management (2018). https:\/\/doi.org\/10.1007\/978-3-319-90775-8_26.","DOI":"10.1007\/978-3-319-90775-8_26"},{"key":"1522_CR9","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2024.2342918","author":"S Dey","year":"2024","unstructured":"Dey S., Garai H.: A multi-step key recovery attack on reduced round Salsa and ChaCha. Cryptologia (2024). https:\/\/doi.org\/10.1080\/01611194.2024.2342918.","journal-title":"Cryptologia"},{"key":"1522_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.dam.2017.04.034","volume":"227","author":"S Dey","year":"2017","unstructured":"Dey S., Sarkar S.: Improved analysis for reduced round Salsa20 and ChaCha. Discret. Appl. Math. 227, 58\u201369 (2017). https:\/\/doi.org\/10.1016\/j.dam.2017.04.034.","journal-title":"Discret. Appl. Math."},{"key":"1522_CR11","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1007\/s10623-020-00736-9","volume":"88","author":"S Dey","year":"2020","unstructured":"Dey S., Sarkar S.: Proving the biases of Salsa and ChaCha in differential attack. Des. Codes Cryptogr. 88, 1827\u20131856 (2020). https:\/\/doi.org\/10.1007\/s10623-020-00736-9.","journal-title":"Des. Codes Cryptogr."},{"key":"1522_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dam.2021.06.017","volume":"302","author":"S Dey","year":"2021","unstructured":"Dey S., Sarkar S.: A theoretical investigation on the distinguishers of Salsa and ChaCha. Discret. Appl. Math. 302, 147\u2013162 (2021). https:\/\/doi.org\/10.1016\/j.dam.2021.06.017.","journal-title":"Discret. Appl. Math."},{"key":"1522_CR13","doi-asserted-by":"publisher","unstructured":"Fischer S., Meier W., Berbain C., Biasse J.-F., Robshaw M.J.B.: Non randomness in eSTREAM candidates Salsa20 and TSC-4. In: Barua R., Lange T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 2\u201316. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11941378_2.","DOI":"10.1007\/11941378_2"},{"key":"1522_CR14","unstructured":"https:\/\/github.com\/SharmaNitinKumar\/Salsa.git."},{"key":"1522_CR15","doi-asserted-by":"publisher","unstructured":"Langford S.K., Hellman M.E.: Differential-linear cryptanalysis. In: Annual International Cryptology Conference, California, USA, pp. 17\u201325 (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3.","DOI":"10.1007\/3-540-48658-5_3"},{"key":"1522_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dam.2016.02.020","volume":"208","author":"S Maitra","year":"2016","unstructured":"Maitra S.: Chosen IV cryptanalysis on reduced round ChaCha and Salsa20. Discret. Appl. Math. 208, 88\u201397 (2016). https:\/\/doi.org\/10.1016\/j.dam.2016.02.020.","journal-title":"Discret. Appl. Math."},{"key":"1522_CR17","unstructured":"Maitra S., Paul G., Meier W.: Salsa20 cryptanalysis: new moves and revisiting old styles. In: 9th International Workshop on Coding and Cryptography, WCC 2015 (2015). https:\/\/eprint.iacr.org\/2015\/217."},{"key":"1522_CR18","doi-asserted-by":"publisher","unstructured":"Matsui M., Yamagishi A.: A new method for known plaintext attack of FEAL cipher. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 658, pp. 81\u201391. Springer, Berlin (1992). https:\/\/doi.org\/10.1007\/3-540-47555-9_7.","DOI":"10.1007\/3-540-47555-9_7"},{"key":"1522_CR19","doi-asserted-by":"publisher","unstructured":"Shi Z., Zhang B., Feng D., Wu W.: Improved key recovery attacks on reduced round Salsa20 and ChaCha. In: ICISC 2012. LNCS, vol. 7839, pp. 337\u2013351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_24.","DOI":"10.1007\/978-3-642-37682-5_24"},{"key":"1522_CR20","unstructured":"Tsunoo Y., Saito T., Kubo H., Suzaki T., Nakashima H.: Differential Cryptanalysis of Salsa20\/8. In: eSTREAM, ECRYPT Stream Cipher Project (2007). http:\/\/www.ecrypt.eu.org\/stream\/papersdir\/2007\/010.pdf."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01522-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01522-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01522-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T17:10:55Z","timestamp":1737565855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01522-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,9]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1522"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01522-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2024,11,9]]},"assertion":[{"value":"30 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}