• Quark

  • Referenced in 20 articles [sw08447]
  • security against all attacks (collisions, multicollisions, distinguishers, etc.), fits in 1379 gate-equivalents, and consumes...
  • KDD Cup

  • Referenced in 9 articles [sw22251]
  • model capable of distinguishing between “bad” connections, called intrusions or attacks, and “good” normal connections...
  • ARXtools

  • Referenced in 10 articles [sw09727]
  • scenarios: on the one hand we show attacks with a relatively low complexity, in relatively ... settings; and on the other hand weaker distinguishers reaching more rounds. Our most notable results ... free-start and semi-free-start collision attacks for 20 rounds and 12 rounds...
  • deep_speck

  • Referenced in 1 article [sw34578]
  • Improving attacks on round-reduced Speck32/64 using deep learning. This paper has four main contributions ... machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple ... data, chosen plaintext attack on nine rounds of Speck, we present distinguishers based on deep ... purely differential distinguishers even given unlimited data. While our attack is based on a known...
  • SGS

  • Referenced in 1 article [sw38855]
  • protecting control plane against DDoS attacks, and the main characteristic of SGS is deploying multi ... focuses on switches in data plane to distinguish forged flows from legitimate ones by innovatively ... feature vector. Controller dynamic defense mitigates DDoS attacks’ effects on control plane by remapping controller...
  • XDist

  • Referenced in 2 articles [sw13582]
  • made much effort on establishing ranking models distinguishing relevant and irrelevant passages, such ... searching system XDist is accordingly proposed to attack the problems aforementioned. In XDist, we firstly...
  • GAP

  • Referenced in 2974 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Macaulay2

  • Referenced in 1758 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...
  • Magma

  • Referenced in 3052 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5199 articles [sw00545]
  • The result of over 30 years of cutting...
  • Matlab

  • Referenced in 12640 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • NTL

  • Referenced in 208 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • SageMath

  • Referenced in 1743 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 232 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • HAVAL

  • Referenced in 45 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5...
  • OMAC

  • Referenced in 9 articles [sw02642]
  • Modeling involves a series of stages, from the...
  • CLEFIA

  • Referenced in 62 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...
  • CPLEX

  • Referenced in 2641 articles [sw04082]
  • IBM® ILOG® CPLEX® offers C, C++, Java, .NET...
  • Gurobi

  • Referenced in 572 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...