• SageMath

  • Referenced in 955 articles [sw00825]
  • teaching in algebra, geometry, number theory, cryptography, numerical computation, and related areas. Both the Sage...
  • gmp

  • Referenced in 184 articles [sw00363]
  • main target applications for GMP are cryptography applications and research, Internet security applications, algebra systems...
  • HMQV

  • Referenced in 69 articles [sw02714]
  • exchange mechanism underlying “the next generation cryptography to protect US government information”. One question that...
  • CLEFIA

  • Referenced in 45 articles [sw03047]
  • internationally-standardized cipher in ISO/IEC 29192 Lightweight cryptography...
  • CBraid

  • Referenced in 28 articles [sw05941]
  • become a matter of interest for the cryptography research community. There still remain lots ... basic tool that is useful in braid cryptography research. The library has been updated...
  • MIRACL

  • Referenced in 22 articles [sw06009]
  • implementing number-theoretic based methods of cryptography. While there are many libraries out there that ... support Cryptography on a PC, MIRACL does more by securing embedded-devices and mobile smart ... paradigm of Pairing-Based Cryptography...
  • OpenSSL

  • Referenced in 35 articles [sw09945]
  • well as a full-strength general purpose cryptography library. The project is managed...
  • SIMATH

  • Referenced in 30 articles [sw00861]
  • special emphasis on elliptic curves and cryptography. SIMATH is a set of C libraries...
  • ring-LWE

  • Referenced in 16 articles [sw19028]
  • toolkit for ring-LWE cryptography. Recent advances in lattice cryptography, mainly stemming from the development ... realizing the full potential of ring-based cryptography has so far been hindered...
  • Twofish

  • Referenced in 25 articles [sw13585]
  • cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits...
  • LMFDB

  • Referenced in 24 articles [sw07249]
  • have applications to mathematical physics and cryptography. By an L-function, we generally mean...
  • ProVerif

  • Referenced in 22 articles [sw06558]
  • cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie...
  • LEX

  • Referenced in 17 articles [sw19585]
  • Cipher LEX, Proceedings of Selected Areas in Cryptography, 2006 Springer, pp 67–75, 2007) presented...
  • PBC Library

  • Referenced in 10 articles [sw09829]
  • Pairing-based cryptography is a relatively young area of cryptography that revolves around a certain ... with special properties. The PBC (Pairing-Based Cryptography) library is a free C library (released...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • Verification of Secrecy in Security Protocols. Cryptography is not sufficient for implementing secure exchange ... even under the idealized assumption of perfect cryptography. Most of protocol verification tools are model...
  • TinyECC

  • Referenced in 12 articles [sw09089]
  • TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC...
  • G-Hadoop

  • Referenced in 11 articles [sw08480]
  • several security solutions such as public key cryptography and the SSL protocol, and is dedicatedly...
  • MiniLEGO

  • Referenced in 11 articles [sw09866]
  • only primitives from Minicrypt (i.e., private-key cryptography) per gate in the circuit (hence...
  • FairplayMP

  • Referenced in 9 articles [sw11926]
  • great achievements of modern cryptography, enabling a set of untrusting parties to compute any function...
  • Midori

  • Referenced in 9 articles [sw17436]
  • energy. In the past few years, lightweight cryptography has become a popular research discipline with...