• PVSAE

  • Referenced in 2 articles [sw36766]
  • hand, they need querying over encrypted data in Web based data hosting services ... keep the query keywords and associated search operations private such that data hosting service providers ... encrypted data with two formal security properties in terms of IND-CKA security and search ... properties and offers higher efficiency for search over encrypted data compared with existing verifiable searchable...
  • SOSEMANUK

  • Referenced in 15 articles [sw09724]
  • show that when the length of an encryption key is larger than 176 bits ... more efficient than an exhaustive key search...
  • OOABKS

  • Referenced in 1 article [sw33540]
  • OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud. Mobile cloud computing ... security and privacy concerns, data owners usually encrypt their data before outsourcing them ... based keyword search (ABKS) schemes have been proposed. However, the key generation, encryption and decryption ... propose an online/offline attribute-based keyword search scheme for mobile cloud (OOABKS). We use online/offline...
  • SHIELD

  • Referenced in 7 articles [sw20121]
  • implementation, namely the IBM homomorphic encryption library (HElib). We introduce several optimizations ... homomorphic Bayesian spam filter, secure multiple keyword search, and a homomorphic evaluator for binary decision...
  • Clusion

  • Referenced in 1 article [sw23225]
  • software library for searchable symmetric encryption (SSE). Its goal is to provide modular implementations ... single, disjunctive, conjunctive and (arbitrary) boolean keyword search. All the implemented schemes have sub-linear...
  • Coq

  • Referenced in 1807 articles [sw00161]
  • Coq is a formal proof management system. It...
  • gmp

  • Referenced in 269 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 2917 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5124 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 5957 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 12309 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • NTL

  • Referenced in 202 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • SageMath

  • Referenced in 1675 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 517 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...
  • Klava

  • Referenced in 19 articles [sw01243]
  • Klava: a Java package for distributed and mobile...
  • JPEG2000

  • Referenced in 63 articles [sw02062]
  • The JPEG 2000 Suite provides a comprehensive overview...
  • McEliece

  • Referenced in 225 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • M-TREE

  • Referenced in 13 articles [sw02565]
  • Secure processor architectures enable new sets of applications...
  • MIMO-OFDM

  • Referenced in 4 articles [sw02699]
  • MIMO-OFDM system based on fractional Fourier transform...
  • CLEFIA

  • Referenced in 62 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...