• BRISK

  • Referenced in 18 articles [sw29764]
  • BRISK: Binary robust invariant scalable keypoints. Effective and efficient generation of keypoints from an image ... magnitude faster than SURF in cases). The key to speed lies in the application ... combination with the assembly of a bit-string descriptor from intensity comparisons retrieved by dedicated...
  • HykSort

  • Referenced in 2 articles [sw17476]
  • strong scaling results and study the effect of the grain size. It turns out that ... trillion 32-bit integer keys in 37 seconds achieving 0.9TB/s effective throughput...
  • Copker

  • Referenced in 1 article [sw37373]
  • full disk encryption. In practice, the cryptographic keys are loaded and stored ... cold-boot attacks exploiting the remanence effect of RAM chips to directly read memory data ... ECDSA), and deterministic random bit generators (DRBGs) used in ECDSA signing. In its active mode ... kilobytes of sensitive data, including the private key, the DRBG seed and intermediate states, only...
  • GPUSort

  • Referenced in 2 articles [sw14143]
  • GPUs using simple texture mapping operations and effectively utilizes the memory bandwidth using cache-efficient ... bit precision, and can also quickly sort records based on a floating point key. Please...
  • SAFECode

  • Referenced in 4 articles [sw13323]
  • points-to information or type information. The key insight behind our approach is that pool ... meta-data on pointers or individual tag bits for memory. Using several benchmark ... have seen).We also show the effectiveness of static analyses in eliminating run-time checks...
  • DBlock

  • Referenced in 1 article [sw13576]
  • equal $n$-bit block length and key length. The structure of DBlock successfully combines ... word-sizes, which efficiently improve the diffusion effect. For key schedule of DBlock, it basically...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • shown to be effective for attacking ciphers that use simple algebraic functions. However, there ... block size is 64 bits and $m=8$, all round keys are recovered for SNAKE...
  • MSP430X

  • Referenced in 1 article [sw32622]
  • cryptography (ECC) and supersingular isogeny Diffie-Hellman key exchange (SIDH), modular multiplication is the most ... microprocessors (e.g., 8-bit AVR and 16-bit MSP430X), is mainly relied on the efficiency ... based on interleaved Montgomery multiplication on 16-bit MSP430X microprocessors, where the multiplication part ... modular multiplication routine, respectively. This approach is effective for special modulus of NIST curves...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5363 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13460 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9810 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • CUDA

  • Referenced in 1317 articles [sw03258]
  • The NVIDIA® CUDA® Toolkit provides a comprehensive development...
  • MPFR

  • Referenced in 226 articles [sw03312]
  • The MPFR library is a C library for...
  • Why3

  • Referenced in 134 articles [sw04438]
  • Why3 is a platform for deductive program verification...
  • CUDD

  • Referenced in 158 articles [sw04446]
  • The CUDD package provides functions to manipulate Binary...
  • JML

  • Referenced in 189 articles [sw04597]
  • The Java Modeling Language (JML) is a behavioral...