• QUAD

  • Referenced in 7 articles [sw19553]
  • QUAD: A multivariate stream cipher with provable security. We present the stream cipher QUAD ... provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed...
  • McOE

  • Referenced in 4 articles [sw20876]
  • line and are provably secure against nonce-respecting adversaries. But they fail badly for more ... schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed ... McOE family, it provably guarantees reasonable security against general adversaries as well as standard security...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • enhancement technologies. In addition to a provably secure message transfer protocol, we have designed...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea ... Japan Joint Workshop on Information Security and Cryptology...
  • Coq

  • Referenced in 1195 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 218 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • Mathematica

  • Referenced in 4164 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Reveal

  • Referenced in 19 articles [sw00801]
  • We describe the Reveal formal functional verification system...
  • SageMath

  • Referenced in 815 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • ESIGN

  • Referenced in 21 articles [sw02120]
  • ESIGN is an efficient digital signature algorithm [OkS...
  • OMAC

  • Referenced in 9 articles [sw02642]
  • Modeling involves a series of stages, from the...
  • HMQV

  • Referenced in 61 articles [sw02714]
  • The MQV protocol of Law, Menezes, Qu, Solinas...
  • OTTER

  • Referenced in 224 articles [sw02904]
  • Our current automated deduction system Otter is designed...
  • KASUMI

  • Referenced in 20 articles [sw02926]
  • KASUMI is a block cipher used in UMTS...
  • CLEFIA

  • Referenced in 40 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...
  • NAXOS

  • Referenced in 45 articles [sw03050]
  • LaMacchia, Lauter and Mityagin recently presented a strong...
  • KEM-DEM

  • Referenced in 50 articles [sw03093]
  • A universally composable secure channel based on the...
  • EC2C-PAKA

  • Referenced in 11 articles [sw03308]
  • EC2C-PAKA: an efficient client-to-client password...