• McOE

  • Referenced in 12 articles [sw20876]
  • Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
  • GnuPG

  • Referenced in 9 articles [sw08524]
  • RFC4880. GnuPG allows to encrypt and sign your data and communication, features a versatile ... command line tool with features for easy integration with other applications. A wealth of frontend...
  • W3Bcrypt

  • Referenced in 1 article [sw30069]
  • trusted. The end-to-end (E2E) encryption of data becomes increasingly important in these trust ... protect the confidentiality and integrity of the data against snooping and modification. We introduce W3Bcrypt ... operations. Among the main benefits of using encryption as a stylesheet are (a) reduced workload...
  • SCTP

  • Referenced in 2 articles [sw03483]
  • AUTH protocol extension of SCTP for integrity protection of both control and user messages ... authentication and key agreement; Data confidentiality is provided through encryption and decryption at the socket...
  • Bel-T

  • Referenced in 1 article [sw29704]
  • national block cipher encryption standard of the Republic of Belarus ... whole cipher. In this paper, we present integral attacks against Bel-T-256 using ... property. Firstly, we propose two 2-round integral characteristics by employing a mixed integer linear ... with data and time complexities of (2^{13}) chosen plaintexts and (2^{199.33}) encryption operations...
  • Lockr

  • Referenced in 2 articles [sw30796]
  • providers. Finally, Lockr enables message encryption using a social re- lationship key. This key lets ... others, a common privacy threat when sharing data in a decentral- ized scenario. This paper ... design and implementation and shows how we integrate it with Flickr, a centralized...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ”UDP source-port ... attackers have much more trouble preventing DNS data from getting through. Protection is also needed ... part of a larger project to encrypt and authenticate all Internet packets. The techniques used...
  • Coq

  • Referenced in 1748 articles [sw00161]
  • Coq is a formal proof management system. It...
  • gmp

  • Referenced in 255 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 2716 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 4896 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 5693 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 11446 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • NTL

  • Referenced in 192 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • PARI/GP

  • Referenced in 564 articles [sw00680]
  • PARI/GP is a widely used Computer Algebra System...
  • SageMath

  • Referenced in 1505 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Fish

  • Referenced in 6 articles [sw01254]
  • Fish: A fast software stream cipher This paper...
  • JPEG2000

  • Referenced in 63 articles [sw02062]
  • The JPEG 2000 Suite provides a comprehensive overview...
  • M-TREE

  • Referenced in 13 articles [sw02565]
  • Secure processor architectures enable new sets of applications...
  • SPINS

  • Referenced in 49 articles [sw02657]
  • Wireless sensor networks will be widely deployed in...