
BRISK
 Referenced in 18 articles
[sw29764]
 BRISK: Binary robust invariant scalable keypoints. Effective and efficient generation of keypoints from an image ... magnitude faster than SURF in cases). The key to speed lies in the application ... combination with the assembly of a bitstring descriptor from intensity comparisons retrieved by dedicated...

HykSort
 Referenced in 2 articles
[sw17476]
 strong scaling results and study the effect of the grain size. It turns out that ... trillion 32bit integer keys in 37 seconds achieving 0.9TB/s effective throughput...

Copker
 Referenced in 1 article
[sw37373]
 full disk encryption. In practice, the cryptographic keys are loaded and stored ... coldboot attacks exploiting the remanence effect of RAM chips to directly read memory data ... ECDSA), and deterministic random bit generators (DRBGs) used in ECDSA signing. In its active mode ... kilobytes of sensitive data, including the private key, the DRBG seed and intermediate states, only...

GPUSort
 Referenced in 2 articles
[sw14143]
 GPUs using simple texture mapping operations and effectively utilizes the memory bandwidth using cacheefficient ... bit precision, and can also quickly sort records based on a floating point key. Please...

SAFECode
 Referenced in 4 articles
[sw13323]
 pointsto information or type information. The key insight behind our approach is that pool ... metadata on pointers or individual tag bits for memory. Using several benchmark ... have seen).We also show the effectiveness of static analyses in eliminating runtime checks...

DBlock
 Referenced in 1 article
[sw13576]
 equal $n$bit block length and key length. The structure of DBlock successfully combines ... wordsizes, which efficiently improve the diffusion effect. For key schedule of DBlock, it basically...

SNAKE
 Referenced in 2 articles
[sw21078]
 shown to be effective for attacking ciphers that use simple algebraic functions. However, there ... block size is 64 bits and $m=8$, all round keys are recovered for SNAKE...

MSP430X
 Referenced in 1 article
[sw32622]
 cryptography (ECC) and supersingular isogeny DiffieHellman key exchange (SIDH), modular multiplication is the most ... microprocessors (e.g., 8bit AVR and 16bit MSP430X), is mainly relied on the efficiency ... based on interleaved Montgomery multiplication on 16bit MSP430X microprocessors, where the multiplication part ... modular multiplication routine, respectively. This approach is effective for special modulus of NIST curves...

gmp
 Referenced in 282 articles
[sw00363]
 GMP is a free library for arbitrary precision...

Magma
 Referenced in 3296 articles
[sw00540]
 Computer algebra system (CAS). Magma is a large...

Maple
 Referenced in 5363 articles
[sw00545]
 The result of over 30 years of cutting...

Mathematica
 Referenced in 6337 articles
[sw00554]
 Almost any workflow involves computing results, and that...

Matlab
 Referenced in 13460 articles
[sw00558]
 MATLAB® is a highlevel language and interactive...

R
 Referenced in 9810 articles
[sw00771]
 R is a language and environment for statistical...

SageMath
 Referenced in 1970 articles
[sw00825]
 Sage (SageMath) is free, opensource math software...

CUDA
 Referenced in 1317 articles
[sw03258]
 The NVIDIA® CUDA® Toolkit provides a comprehensive development...

MPFR
 Referenced in 226 articles
[sw03312]
 The MPFR library is a C library for...

Why3
 Referenced in 134 articles
[sw04438]
 Why3 is a platform for deductive program verification...

CUDD
 Referenced in 158 articles
[sw04446]
 The CUDD package provides functions to manipulate Binary...

JML
 Referenced in 189 articles
[sw04597]
 The Java Modeling Language (JML) is a behavioral...