{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:00:21Z","timestamp":1740178821765,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,5]],"date-time":"2019-01-05T00:00:00Z","timestamp":1546646400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s41635-018-0057-y","type":"journal-article","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T23:32:22Z","timestamp":1546644742000},"page":"94-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Diagonal Constants for Extension of Salsa to 64 Bit"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3040-9830","authenticated-orcid":false,"given":"Bhagwan N.","family":"Bathe","sequence":"first","affiliation":[]},{"given":"Bharti","family":"Hariramani","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Bhattacharjee","sequence":"additional","affiliation":[]},{"given":"S. V.","family":"Kulgod","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,5]]},"reference":[{"key":"57_CR1","doi-asserted-by":"publisher","unstructured":"Bathe BN, Hariramani B, Bhattacharjee A, Kulgod S (2017) Analysis of diagonal constants in salsa. In: Ali S, Danger J L, Eisenbarth T (eds) Security, privacy, and applied cryptography engineering. SPACE 2017. Lecture notes in computer science, vol 10662. Springer, Cham, pp 93\u2013110. \n                    https:\/\/doi.org\/10.1007\/978-3-319-71501-8_6","DOI":"10.1007\/978-3-319-71501-8_6"},{"key":"57_CR2","unstructured":"Bernstein DJ (2005) Salsa20 specification. eSTREAM Project algorithm description. \n                    http:\/\/www.ecrypt.eu.org\/stream\/salsa20pf.html"},{"key":"57_CR3","unstructured":"The ECRYPT stream cipher project. eSTREAM portfolio of stream ciphers. \n                    http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"57_CR4","unstructured":"Bernstein DJ (2008) ChaCha, a variant of Salsa20. In: Workshop record of SASC, vol 8"},{"key":"57_CR5","first-page":"470","volume-title":"New features of Latin dances: analysis of Salsa, ChaCha, and Rumba","author":"JP Aumasson","year":"2008","unstructured":"Aumasson JP, Fischer S, Khazaei S, Meier W, Rechberger C (2008) New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. Springer, Berlin, pp 470\u2013488"},{"key":"57_CR6","doi-asserted-by":"publisher","unstructured":"Castro JCH, Est\u00e9vez-Tapiador JM, Quisquater J (2008) On the Salsa20 core function. In: Fast software encryption, 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10\u201313, 2008, Revised Selected Papers, pp 462\u2013469. \n                    https:\/\/doi.org\/10.1007\/978-3-540-71039-4_29","DOI":"10.1007\/978-3-540-71039-4_29"},{"key":"57_CR7","first-page":"375","volume":"2005","author":"P Crowley","year":"2005","unstructured":"Crowley P (2005) Truncated differential cryptanalysis of five rounds of Salsa20. IACR Cryptology ePrint Archive 2005:375. \n                    http:\/\/eprint.iacr.org\/2005\/375","journal-title":"IACR Cryptology ePrint Archive"},{"key":"57_CR8","doi-asserted-by":"publisher","unstructured":"Fischer S, Meier W, Berbain C, Biasse J, Robshaw MJB (2006) Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. In: Progress in cryptology - INDOCRYPT 2006, 7th international conference on cryptology in India, Kolkata, India, December 11\u201313, 2006, Proceedings, pp 2\u201316. \n                    https:\/\/doi.org\/10.1007\/11941378_2","DOI":"10.1007\/11941378_2"},{"key":"57_CR9","doi-asserted-by":"publisher","unstructured":"Ishiguro T, Kiyomoto S, Miyake Y (2011) Latin dances revisited: new analytic results of Salsa20 and ChaCha. In: Information and communications security - 13th international conference, ICICS 2011, Beijing, China, November 23\u201326, 2011. Proceedings, pp 255\u2013266. \n                    https:\/\/doi.org\/10.1007\/978-3-642-25243-3_21","DOI":"10.1007\/978-3-642-25243-3_21"},{"key":"57_CR10","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dam.2016.02.020","volume":"208","author":"S Maitra","year":"2016","unstructured":"Maitra S (2016) Chosen IV cryptanalysis on reduced round ChaCha and Salsa. Discret Appl Math 208:88\u201397. \n                    https:\/\/doi.org\/10.1016\/j.dam.2016.02.020\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0166218X16300841","journal-title":"Discret Appl Math"},{"key":"57_CR11","unstructured":"Maitra S, Paul G, Meier W (2015) Salsa20 cryptanalysis: new moves and revisiting old styles. In: WCC 2015, the ninth international workshop on coding and cryptography, April 13\u201317, 2015, Paris. \n                    http:\/\/eprint.iacr.org\/2015\/217"},{"key":"57_CR12","first-page":"328","volume":"2013","author":"N Mouha","year":"2013","unstructured":"Mouha N, Preneel B (2013) A proof that the ARX Cipher Salsa20 is secure against differential cryptanalysis. IACR Cryptology ePrint Archive 2013:328. \n                    http:\/\/eprint.iacr.org\/2013\/328","journal-title":"IACR Cryptology ePrint Archive"},{"key":"57_CR13","unstructured":"Tsunoo Y, Saito T, Kubo H, Suzaki T, Nakashima H (2007) Differential cryptanalysis of Salsa20\/8. \n                    http:\/\/ecrypt.eu.org\/stream\/papersdir\/2007\/010.pdf"},{"key":"57_CR14","first-page":"826","volume":"2016","author":"T Ashur","year":"2016","unstructured":"Ashur T, Liu Y (2016) Rotational cryptanalysis in the presence of constants. IACR Cryptology ePrint Archive 2016:826. \n                    http:\/\/eprint.iacr.org\/2016\/826","journal-title":"IACR Cryptology ePrint Archive"},{"key":"57_CR15","unstructured":"Bernstein D (2005) The salsa20 encryption function. \n                    https:\/\/cr.yp.to\/snuffle.html"},{"key":"57_CR16","first-page":"1034","volume":"2016","author":"AR Choudhuri","year":"2016","unstructured":"Choudhuri AR, Maitra S (2016) Significantly improved multi-bit differentials for reduced round salsa and chacha. IACR Cryptology ePrint Archive 2016:1034. \n                    http:\/\/eprint.iacr.org\/2016\/1034","journal-title":"IACR Cryptology ePrint Archive"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Sobti R, Ganesan G (2016) Analysis of quarter rounds of salsa and chacha core and proposal of an alternative design to maximize diffusion. Ind J Sci Technol. \n                    http:\/\/www.indjst.org\/index.php\/indjst\/article\/viewFile\/80087\/67062","DOI":"10.17485\/ijst\/2016\/v9i3\/80087"},{"key":"57_CR18","unstructured":"Supercop (2018) \n                    https:\/\/bench.cr.yp.to\/supercop.html"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0057-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0057-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0057-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T19:05:02Z","timestamp":1578164702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0057-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,5]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["57"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0057-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2019,1,5]]},"assertion":[{"value":"24 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}