• SageMath

  • Referenced in 705 articles [sw00825]
  • teaching in algebra, geometry, number theory, cryptography, numerical computation, and related areas. Both the Sage...
  • gmp

  • Referenced in 150 articles [sw00363]
  • main target applications for GMP are cryptography applications and research, Internet security applications, algebra systems...
  • HMQV

  • Referenced in 59 articles [sw02714]
  • exchange mechanism underlying “the next generation cryptography to protect US government information”. One question that...
  • CLEFIA

  • Referenced in 39 articles [sw03047]
  • internationally-standardized cipher in ISO/IEC 29192 Lightweight cryptography...
  • CBraid

  • Referenced in 25 articles [sw05941]
  • become a matter of interest for the cryptography research community. There still remain lots ... basic tool that is useful in braid cryptography research. The library has been updated...
  • OpenSSL

  • Referenced in 34 articles [sw09945]
  • well as a full-strength general purpose cryptography library. The project is managed...
  • MIRACL

  • Referenced in 20 articles [sw06009]
  • implementing number-theoretic based methods of cryptography. While there are many libraries out there that ... support Cryptography on a PC, MIRACL does more by securing embedded-devices and mobile smart ... paradigm of Pairing-Based Cryptography...
  • SIMATH

  • Referenced in 28 articles [sw00861]
  • special emphasis on elliptic curves and cryptography. SIMATH is a set of C libraries...
  • Twofish

  • Referenced in 24 articles [sw13585]
  • cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits...
  • ProVerif

  • Referenced in 19 articles [sw06558]
  • cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie...
  • HERMES

  • Referenced in 11 articles [sw00403]
  • Verification of Secrecy in Security Protocols. Cryptography is not sufficient for implementing secure exchange ... even under the idealized assumption of perfect cryptography. Most of protocol verification tools are model...
  • PBC Library

  • Referenced in 8 articles [sw09829]
  • Pairing-based cryptography is a relatively young area of cryptography that revolves around a certain ... with special properties. The PBC (Pairing-Based Cryptography) library is a free C library (released...
  • G-Hadoop

  • Referenced in 10 articles [sw08480]
  • several security solutions such as public key cryptography and the SSL protocol, and is dedicatedly...
  • LMFDB

  • Referenced in 9 articles [sw07249]
  • have applications to mathematical physics and cryptography. By an L-function, we generally mean...
  • TinyECC

  • Referenced in 9 articles [sw09089]
  • TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC...
  • SATMC

  • Referenced in 8 articles [sw09469]
  • protocols. Under the standard assumptions of perfect cryptography and of strong typing, SATMC performs...
  • CRAG

  • Referenced in 5 articles [sw06865]
  • CRyptography And Groups (CRAG) C++ and Python Library. The Cryptography And Groups (CRAG) Library provides...
  • CryptoLib

  • Referenced in 7 articles [sw13517]
  • CryptoLib: Cryptography in Software. CryptoLib is a very complete, efficient and portable library of tools...
  • FairplayMP

  • Referenced in 5 articles [sw11926]
  • great achievements of modern cryptography, enabling a set of untrusting parties to compute any function...
  • McBits

  • Referenced in 3 articles [sw14754]
  • McBits: Fast Constant-Time Code-Based Cryptography. This paper presents extremely fast algorithms for code ... based public-key cryptography, including full protection against timing attacks. For example...