• MISTY

  • Referenced in 21 articles [sw24162]
  • basis of the theory of provable security against differential and linear cryptanalysis, and moreover they...
  • QUAD

  • Referenced in 13 articles [sw19553]
  • QUAD: A multivariate stream cipher with provable security. We present the stream cipher QUAD ... provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed...
  • McOE

  • Referenced in 12 articles [sw20876]
  • line and are provably secure against nonce-respecting adversaries. But they fail badly for more ... schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed ... McOE family, it provably guarantees reasonable security against general adversaries as well as standard security...
  • Sharemind

  • Referenced in 10 articles [sw22617]
  • this paper, we present a provably secure and efficient general-purpose computation system to address...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • block cipher inverse and hence enjoys provable security under a weaker assumption about the underlying...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • enhancement technologies. In addition to a provably secure message transfer protocol, we have designed...
  • GRECS

  • Referenced in 1 article [sw23226]
  • three oracle encryption schemes that are provably secure against any semi-honest server. Our first...
  • Hamsa

  • Referenced in 4 articles [sw23930]
  • provable attack resilience. Zero-day polymorphic worms pose a serious threat to the security...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea ... Japan Joint Workshop on Information Security and Cryptology...
  • Coq

  • Referenced in 1376 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 223 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 214 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Mathematica

  • Referenced in 4784 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Reveal

  • Referenced in 19 articles [sw00801]
  • We describe the Reveal formal functional verification system...
  • SageMath

  • Referenced in 1098 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 458 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 176 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • ESIGN

  • Referenced in 22 articles [sw02120]
  • ESIGN is an efficient digital signature algorithm [OkS...