
Quark
 Referenced in 20 articles
[sw08447]
 security against all attacks (collisions, multicollisions, distinguishers, etc.), fits in 1379 gateequivalents, and consumes...

KDD Cup
 Referenced in 9 articles
[sw22251]
 model capable of distinguishing between “bad” connections, called intrusions or attacks, and “good” normal connections...

ARXtools
 Referenced in 10 articles
[sw09727]
 scenarios: on the one hand we show attacks with a relatively low complexity, in relatively ... settings; and on the other hand weaker distinguishers reaching more rounds. Our most notable results ... freestart and semifreestart collision attacks for 20 rounds and 12 rounds...

deep_speck
 Referenced in 1 article
[sw34578]
 Improving attacks on roundreduced Speck32/64 using deep learning. This paper has four main contributions ... machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple ... data, chosen plaintext attack on nine rounds of Speck, we present distinguishers based on deep ... purely differential distinguishers even given unlimited data. While our attack is based on a known...

SGS
 Referenced in 1 article
[sw38855]
 protecting control plane against DDoS attacks, and the main characteristic of SGS is deploying multi ... focuses on switches in data plane to distinguish forged flows from legitimate ones by innovatively ... feature vector. Controller dynamic defense mitigates DDoS attacks’ effects on control plane by remapping controller...

XDist
 Referenced in 2 articles
[sw13582]
 made much effort on establishing ranking models distinguishing relevant and irrelevant passages, such ... searching system XDist is accordingly proposed to attack the problems aforementioned. In XDist, we firstly...

GAP
 Referenced in 2974 articles
[sw00320]
 GAP is a system for computational discrete algebra...

Macaulay2
 Referenced in 1758 articles
[sw00537]
 Macaulay2 is a software system devoted to supporting...

Magma
 Referenced in 3052 articles
[sw00540]
 Computer algebra system (CAS). Magma is a large...

Maple
 Referenced in 5199 articles
[sw00545]
 The result of over 30 years of cutting...

Matlab
 Referenced in 12640 articles
[sw00558]
 MATLAB® is a highlevel language and interactive...

NTL
 Referenced in 208 articles
[sw00638]
 NTL is a highperformance, portable C++ library...

SageMath
 Referenced in 1743 articles
[sw00825]
 Sage (SageMath) is free, opensource math software...

Scream
 Referenced in 4 articles
[sw01287]
 Scream: A softwareefficient stream cipher. We report...

McEliece
 Referenced in 232 articles
[sw02076]
 Practical power analysis attacks on software implementations of...

HAVAL
 Referenced in 45 articles
[sw02156]
 HAVAL is a cryptographic hash function. Unlike MD5...

OMAC
 Referenced in 9 articles
[sw02642]
 Modeling involves a series of stages, from the...

CLEFIA
 Referenced in 62 articles
[sw03047]
 CLEFIA is an efficient, highly secure block cipher...

CPLEX
 Referenced in 2641 articles
[sw04082]
 IBM® ILOG® CPLEX® offers C, C++, Java, .NET...

Gurobi
 Referenced in 572 articles
[sw04105]
 GUROBI OPTIMIZER: State of the Art Mathematical Programming...