• ring-LWE

  • Referenced in 28 articles [sw19028]
  • have made it possible to design cryptographic schemes whose efficiency is competitive with that ... wide variety of ring-based cryptographic applications, particularly those built around ring-LWE. Our techniques ... cryptosystem and a “somewhat homomorphic” symmetric encryption scheme. Both apply to arbitrary cyclotomics, have tight...
  • Crypto++

  • Referenced in 11 articles [sw11765]
  • free C++ class library of cryptographic schemes. Currently the library contains the following algorithms...
  • Charm

  • Referenced in 11 articles [sw10192]
  • interoperate. We implemented over 40 cryptographic schemes using Charm, including some new ones that...
  • McOE

  • Referenced in 14 articles [sw20876]
  • line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line ... frequent issue. In recent years, cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee...
  • NFLlib

  • Referenced in 4 articles [sw14675]
  • promising competitive alternative to classical cryptographic schemes. In this paper, we introduce NFLlib, an efficient...
  • MSP430X

  • Referenced in 1 article [sw32622]
  • operation among basic arithmetic of these cryptographic schemes. For this reason, the execution timing ... such cryptographic schemes in an implementation level, which may highly determine the service availability ... multiplication has broad applications to other cryptographic schemes and microprocessors...
  • XKCP

  • Referenced in 2 articles [sw36433]
  • open-source implementations of the cryptographic schemes defined by the Keccak team. This includes...
  • CertiCrypt

  • Referenced in 6 articles [sw09443]
  • general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt ... encryption schemes. This paper describes programming language techniques that arise specifically in cryptographic proofs ... security of the OAEP padding scheme. In this paper, we illustrate their usefulness for showing ... PRP/PRF Switching Lemma, a fundamental cryptographic result that bounds the probability of an adversary...
  • Lilliput

  • Referenced in 9 articles [sw20153]
  • such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate this...
  • NESSIE

  • Referenced in 5 articles [sw02725]
  • approach to evaluate cryptographic algorithms. The NESSIE project (New European Schemes for Signature, Integrity ... portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security...
  • SCAPI

  • Referenced in 3 articles [sw22635]
  • this layer). 2. Non-interactive mid-level cryptographic functions: these are non-interactive functions that ... encryption and signature schemes belong to this layer). 3. Interactive cryptographic protocols: these are interactive ... layer are popular building blocks like commitment schemes, zero knowledge proofs and oblivious transfer...
  • HAL

  • Referenced in 1 article [sw34459]
  • implements homomorphic authenticator (HA) schemes. An HA is a cryptographic primitive that allows for proving...
  • TinyLEGO

  • Referenced in 3 articles [sw29145]
  • scheme for maliciously secure two-party computation. A C++ implementation of the TinyLEGO cryptographic protocol ... implementation of the FJNT16 additively homomorphic commitment scheme...
  • Saber

  • Referenced in 4 articles [sw25250]
  • paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness ... then transformed into an IND-CPA encryption scheme and finally into an IND-CCA secure...
  • WalnutDSA

  • Referenced in 5 articles [sw27489]
  • used as a basis for many different cryptographic applications. This one-way function was specifically ... signature algorithm, analyzes the security of the scheme, provides a proof of security under...
  • Rig

  • Referenced in 1 article [sw13609]
  • framework Rig which is based on secure cryptographic hash functions. It provides the flexibility ... construction. The design of the scheme is very simple to implement in software...
  • BLAZE

  • Referenced in 1 article [sw37634]
  • Bitcoin. Despite the great variety of cryptographic applications blind signatures also found their ... present BLAZE: a new practical blind signature scheme from lattice assumptions. With respect...
  • Falcon

  • Referenced in 4 articles [sw31410]
  • NTRU. The point of a post-quantum cryptographic algorithm is to keep on ensuring ... Peikert and Vaikuntanathan for lattice-based signature schemes. We instantiate that framework over NTRU lattices...
  • Game_Based_Crypto

  • Referenced in 1 article [sw38015]
  • security notions and formally prove secure several cryptographic constructions from the literature using the CryptHOL ... function, an unpredictable function, and of encryption schemes that are indistinguishable under chosen plaintext and/or...
  • nielsen

  • Referenced in 1 article [sw24983]
  • Analysis of secret sharing schemes based on Nielsen transformations. We investigate security properties ... Fine, A. Moldenhauer and G. Rosenberger, Cryptographic protocols based on Nielsen transformations, J. Comput. Comm...