• FGb

  • Referenced in 244 articles [sw00286]
  • wide range of problems in Cryptology (for instance, FGb was explicitly used...
  • Casper

  • Referenced in 95 articles [sw06559]
  • fake messages, but not perform any cryptological attacks...
  • QUAD

  • Referenced in 15 articles [sw19553]
  • Berbain} et al. [in: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • European Network of Excellence for Cryptology (ECRYPT), funded within the Information Societies Technology Programme...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • Japan Joint Workshop on Information Security and Cryptology...
  • DLCT

  • Referenced in 1 article [sw31786]
  • Blondeau, Leander, and Nyberg (Journal of Cryptology, 2017) which obtained an accurate expression under...
  • SBOXDiscovery

  • Referenced in 1 article [sw39003]
  • Gate Count of Bitslice DES.” IACR Cryptology ePrint Archive 2000 (2000): 51. with heavy modification...
  • GAP

  • Referenced in 2992 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Magma

  • Referenced in 3052 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5201 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6112 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • SageMath

  • Referenced in 1778 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SINGULAR

  • Referenced in 1441 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • McEliece

  • Referenced in 235 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • NESSIE

  • Referenced in 5 articles [sw02725]
  • NESSIE: A European approach to evaluate cryptographic algorithms...
  • Mizar

  • Referenced in 474 articles [sw04704]
  • The Mizar System is the only implementation of...
  • Knapsack

  • Referenced in 476 articles [sw04723]
  • Knapsack problems are the simplest NP-hard problems...
  • JavaScript

  • Referenced in 161 articles [sw06868]
  • JavaScript is a scripting language for computers. It...
  • Camellia

  • Referenced in 83 articles [sw09731]
  • Camellia: a 128-bit block cipher and suitable...
  • PrivateLR

  • Referenced in 77 articles [sw11354]
  • PrivateLR: Differentially Private Regularized Logistic Regression. PrivateLR implements...