• ELmD

  • Referenced in 14 articles [sw20823]
  • online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... almost parallelizable except that for associated data processing, the final block-cipher call is sequential ... online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which is completely ... stage) parallel (even in associated data) and fully pipeline implementable. It also provides full privacy...
  • Romulus

  • Referenced in 4 articles [sw41025]
  • cipher (TBC) and which supports authenticated encryption with associated data (AEAD). For its more traditional...
  • Remus

  • Referenced in 3 articles [sw41026]
  • Remus: authenticated encryption with associated data (AEAD) scheme based on a tweakable block cipher...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... parallelizable with some bottleneck in processing associated data. In this paper, we design ... online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which is completely ... stage) parallel (even in associated data) and pipeline implementable. It also provides full privacy when...
  • AEGIS

  • Referenced in 5 articles [sw13246]
  • dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • MapReduce

  • Referenced in 262 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13460 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • McEliece

  • Referenced in 250 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • AVISPA

  • Referenced in 87 articles [sw03172]
  • AVISPA (Automated Validation of Internet Security Protocols and...
  • Gurobi

  • Referenced in 679 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...
  • DLMF

  • Referenced in 2808 articles [sw04968]
  • NIST digital library of mathematical functions. The National...
  • Excel

  • Referenced in 786 articles [sw06848]
  • Microsoft Excel is a powerful spreadsheet application that...
  • eSTREAM

  • Referenced in 102 articles [sw12699]
  • Welcome to the home page of eSTREAM, the...
  • Python

  • Referenced in 2042 articles [sw14460]
  • Python is a widely used high-level, general...
  • SNOW

  • Referenced in 30 articles [sw19554]
  • A new version of the stream cipher SNOW...
  • McOE

  • Referenced in 15 articles [sw20876]
  • McOE: A Family of Almost Foolproof On-Line...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • COBRA: A parallelizable authenticated online cipher without block...