• MCBC

  • Referenced in 7 articles [sw03323]
  • efficient CCA-secure online ciphers: MHCBC and MCBC Online ciphers are those ciphers whose ciphertexts ... against chosen ciphertext adversary (or called CCA-secure). In this paper, we have provided simple...
  • Saber

  • Referenced in 6 articles [sw25250]
  • exchange, CPA-secure encryption and CCA-secure KEM. In this paper, we introduce Saber ... problem (Mod-LWR). We first describe a secure Diffie-Hellman type key exchange protocol, which ... scheme and finally into an IND-CCA secure key encapsulation mechanism using a post-quantum...
  • CertiCrypt

  • Referenced in 6 articles [sw09443]
  • based paradigm, in which the statement of security, and the hypotheses under which ... complete a formal proof of IND-CCA security of the OAEP padding scheme. In this...
  • Backflip

  • Referenced in 2 articles [sw37683]
  • that is proved to be IND-CCA secure. The proof models the KEM with some ... resolved for every IND-CCA secure KEM (BIKE included) where the decapsulation has nonzero failure...
  • ASC-1

  • Referenced in 2 articles [sw19586]
  • secure by reducing its (IND-CCA , INT-CTXT) security to the problem of distinguishing...
  • MOCCA

  • Referenced in 4 articles [sw12932]
  • design and implementation of MOCCA, a distributed CCA framework implemented using the H2O metacomputing system ... capabilities in H2O, including client-provider separation, security, and negotiable transport protocols, enhancements to both ... MOCCA highlights the natural match between CCA components and H2O pluglets, both in structure...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • NTL

  • Referenced in 220 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1994 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • A universally composable secure channel based on the...
  • GAMS

  • Referenced in 866 articles [sw04978]
  • The General Algebraic Modeling System (GAMS) is specifically...
  • Scikit

  • Referenced in 611 articles [sw08058]
  • Scikit-learn: machine learning in python. Scikit-learn...
  • NTRU

  • Referenced in 182 articles [sw11761]
  • NTRU: A ring-based public key cryptosystem. We...
  • Piccolo

  • Referenced in 52 articles [sw13242]
  • Piccolo: An Ultra-Lightweight Blockcipher. We propose a...
  • ORL face

  • Referenced in 116 articles [sw13799]
  • Our Database of Faces, (formerly ’The ORL Database...
  • FRGC

  • Referenced in 46 articles [sw13805]
  • Face Recognition Grand Challenge: The FRGC is structured...
  • AR face

  • Referenced in 189 articles [sw13806]
  • AR Face Database: 126 people (over 4,000...
  • Python

  • Referenced in 2091 articles [sw14460]
  • Python is a widely used high-level, general...