From 342582d784770c67e171f588ef52692735a075d9 Mon Sep 17 00:00:00 2001 From: zooko <> Date: Wed, 7 Oct 2009 17:50:58 +0000 Subject: [PATCH] add estream [Imported from Trac: page Bibliography, version 43] --- Bibliography.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Bibliography.md b/Bibliography.md index 6243f93..016fb28 100644 --- a/Bibliography.md +++ b/Bibliography.md @@ -9,7 +9,7 @@ Here are some papers that are potentially of interest. [Salsa20 Security Arguments](http://cr.yp.to/snuffle.html#security) why Salsa20 is probably safe against this and that threat -[Cryptanalysis of the Tiger Hash Function](https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263) by Mendel and RIjmen +[The European Stream Cipher project](http://www.ecrypt.eu.org/stream) which evaluated many stream ciphers including Salsa20 [defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure. @@ -72,3 +72,4 @@ These are some references which are less interesting or relevant than the ones a [ChaChaCha20](http://cr.yp.to/chacha.html) even better stream cipher; It might be slightly safer than Salsa20 and it is certainly slightly faster on some platforms, but slightly slower on others. However, the author of Salsa20 and ChaChaCha20, Daniel J. Bernstein, seems to have settled on using Salsa20 (or a tweak of it named XSalsa20), so probably that is the one to use. +[Cryptanalysis of the Tiger Hash Function](https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263) by Mendel and RIjmen \ No newline at end of file