
SageMath
 Referenced in 1058 articles
[sw00825]
 teaching in algebra, geometry, number theory, cryptography, numerical computation, and related areas. Both the Sage...

gmp
 Referenced in 209 articles
[sw00363]
 main target applications for GMP are cryptography applications and research, Internet security applications, algebra systems...

HMQV
 Referenced in 74 articles
[sw02714]
 exchange mechanism underlying “the next generation cryptography to protect US government information”. One question that...

CLEFIA
 Referenced in 53 articles
[sw03047]
 internationallystandardized cipher in ISO/IEC 29192 Lightweight cryptography...

MIRACL
 Referenced in 27 articles
[sw06009]
 implementing numbertheoretic based methods of cryptography. While there are many libraries out there that ... support Cryptography on a PC, MIRACL does more by securing embeddeddevices and mobile smart ... paradigm of PairingBased Cryptography...

OpenSSL
 Referenced in 42 articles
[sw09945]
 well as a fullstrength general purpose cryptography library. The project is managed...

CBraid
 Referenced in 28 articles
[sw05941]
 become a matter of interest for the cryptography research community. There still remain lots ... basic tool that is useful in braid cryptography research. The library has been updated...

SIMATH
 Referenced in 30 articles
[sw00861]
 special emphasis on elliptic curves and cryptography. SIMATH is a set of C libraries...

LMFDB
 Referenced in 30 articles
[sw07249]
 have applications to mathematical physics and cryptography. By an Lfunction, we generally mean...

Twofish
 Referenced in 30 articles
[sw13585]
 cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits...

ringLWE
 Referenced in 18 articles
[sw19028]
 toolkit for ringLWE cryptography. Recent advances in lattice cryptography, mainly stemming from the development ... realizing the full potential of ringbased cryptography has so far been hindered...

ProVerif
 Referenced in 22 articles
[sw06558]
 cryptographic primitives, including shared and publickey cryptography (encryption and signatures), hash functions, and Diffie...

PBC Library
 Referenced in 12 articles
[sw09829]
 Pairingbased cryptography is a relatively young area of cryptography that revolves around a certain ... with special properties. The PBC (PairingBased Cryptography) library is a free C library (released...

LEX
 Referenced in 19 articles
[sw19585]
 Cipher LEX, Proceedings of Selected Areas in Cryptography, 2006 Springer, pp 67–75, 2007) presented...

TinyECC
 Referenced in 15 articles
[sw09089]
 TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC...

HERMES
 Referenced in 9 articles
[sw00403]
 Verification of Secrecy in Security Protocols. Cryptography is not sufficient for implementing secure exchange ... even under the idealized assumption of perfect cryptography. Most of protocol verification tools are model...

GHadoop
 Referenced in 11 articles
[sw08480]
 several security solutions such as public key cryptography and the SSL protocol, and is dedicatedly...

MiniLEGO
 Referenced in 11 articles
[sw09866]
 only primitives from Minicrypt (i.e., privatekey cryptography) per gate in the circuit (hence...

FairplayMP
 Referenced in 10 articles
[sw11926]
 great achievements of modern cryptography, enabling a set of untrusting parties to compute any function...

NanoECC
 Referenced in 5 articles
[sw19226]
 NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. By using Elliptic Curve ... Cryptography (ECC), it has been recently shown that PublicKey Cryptography (PKC) is indeed feasible ... related emerging field of PairingBased Cryptography (PBC), on two of the most popular sensor...