• BLAKE

  • Referenced in 8 articles [sw11099]
  • cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated...
  • ring-LWE

  • Referenced in 32 articles [sw19028]
  • realizing the full potential of ring-based cryptography has so far been hindered ... somewhat homomorphic” symmetric encryption scheme. Both apply to arbitrary cyclotomics, have tight parameters, and very...
  • SSUKey

  • Referenced in 1 article [sw34179]
  • Finally, we implement SSUKey as a cryptography provider, apply it to file encryption and Transport...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • even under the idealized assumption of perfect cryptography. Most of protocol verification tools are model ... general, they are applied to discover flaws in cryptographic protocols. On the contrary, tools based...
  • MiniLEGO

  • Referenced in 13 articles [sw09866]
  • level, while previously cut-and-choose was applied on the circuit as a whole. This ... only primitives from Minicrypt (i.e., private-key cryptography) per gate in the circuit (hence...
  • PokeEMU

  • Referenced in 0 articles [sw37204]
  • from cryptography so that each step is invertible. We evaluate this approach by applying...
  • adventures-in-graph-theory

  • Referenced in 1 article [sw23333]
  • manifolds, group theory, algebraic curves, Fourier analysis, cryptography and other areas of combinatorics. An overview ... anyone interested in exploring how they can apply graph theory to other parts of mathematics...
  • MSP430X

  • Referenced in 1 article [sw32622]
  • cryptography (PKC), such as elliptic curve cryptography (ECC) and supersingular isogeny Diffie-Hellman key exchange ... superiority of proposed Montgomery multiplication, we applied the proposed method to the NIST...
  • ECC2

  • Referenced in 1 article [sw38273]
  • main candidates for post quantum cryptography to resist attacks against cryptosystems from quantum computation. However ... attacks can be resisted. More importantly, we apply the list decoding algorithm in the decryption...
  • LAPACK

  • Referenced in 1702 articles [sw00503]
  • LAPACK is written in Fortran 90 and provides...
  • Maple

  • Referenced in 5373 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • Scilab

  • Referenced in 173 articles [sw00834]
  • Scilab includes hundreds of mathematical functions. It has...
  • SINGULAR

  • Referenced in 1508 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • PRISM

  • Referenced in 442 articles [sw01186]
  • PRISM: Probabilistic symbolic model checker. In this paper...
  • Fish

  • Referenced in 6 articles [sw01254]
  • Fish: A fast software stream cipher This paper...
  • COBRA

  • Referenced in 26 articles [sw02211]
  • COBRA: An optimized code for fast analysis of...