• QUAD

  • Referenced in 13 articles [sw19553]
  • QUAD: A multivariate stream cipher with provable security. We present the stream cipher QUAD ... provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed...
  • McOE

  • Referenced in 11 articles [sw20876]
  • line and are provably secure against nonce-respecting adversaries. But they fail badly for more ... schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed ... McOE family, it provably guarantees reasonable security against general adversaries as well as standard security...
  • Sharemind

  • Referenced in 10 articles [sw22617]
  • this paper, we present a provably secure and efficient general-purpose computation system to address...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • enhancement technologies. In addition to a provably secure message transfer protocol, we have designed...
  • COBRA

  • Referenced in 3 articles [sw22878]
  • block cipher inverse and hence enjoys provable security under a weaker assumption about the underlying...
  • GRECS

  • Referenced in 1 article [sw23226]
  • three oracle encryption schemes that are provably secure against any semi-honest server. Our first...
  • Hamsa

  • Referenced in 4 articles [sw23930]
  • provable attack resilience. Zero-day polymorphic worms pose a serious threat to the security...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea ... Japan Joint Workshop on Information Security and Cryptology...
  • Coq

  • Referenced in 1313 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 220 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 209 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Mathematica

  • Referenced in 4654 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Reveal

  • Referenced in 19 articles [sw00801]
  • We describe the Reveal formal functional verification system...
  • SageMath

  • Referenced in 1041 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 438 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 172 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • ESIGN

  • Referenced in 22 articles [sw02120]
  • ESIGN is an efficient digital signature algorithm [OkS...
  • OMAC

  • Referenced in 9 articles [sw02642]
  • Modeling involves a series of stages, from the...