• KEM-DEM

  • Referenced in 59 articles [sw03093]
  • framework. For ISO standards on public-key encryption, Shoup introduced the framework ... Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional ... hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution ... formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using...
  • ProVerif

  • Referenced in 43 articles [sw06558]
  • automatic cryptographic protocol verifier, in the formal model (so called Dolev-Yao model). This protocol ... primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman...
  • PVSAE

  • Referenced in 2 articles [sw36766]
  • offers strong support for outsourced encrypted data with two formal security properties in terms ... offers higher efficiency for search over encrypted data compared with existing verifiable searchable asymmetric encryption...
  • CertiCrypt

  • Referenced in 6 articles [sw09443]
  • describe its application to signature and encryption schemes. This paper describes programming language techniques that ... techniques have been developed to complete a formal proof of IND-CCA security...
  • CoSP

  • Referenced in 5 articles [sw25389]
  • models and for embedding these proofs into formal calculi. CoSP considers arbitrary equational theories ... give a sound implementation of public-key encryption and digital signatures...
  • Alred

  • Referenced in 1 article [sw20410]
  • formally analyze two Alred variants—the Marvin message authentication code and the LetterSoup authenticated-encryption...
  • Marvin

  • Referenced in 1 article [sw20412]
  • formally analyze two Alred variants—the Marvin message authentication code and the LetterSoup authenticated-encryption...
  • LetterSoup

  • Referenced in 1 article [sw20413]
  • formally analyze two Alred variants—the Marvin message authentication code and the LetterSoup authenticated-encryption...
  • EFADS

  • Referenced in 2 articles [sw09459]
  • protocol for cloud computing with proxy re-encryption. The concept of cloud computing has emerged ... outsourcing data onto the cloud. Through formal security analysis, we demonstrate that EFADS provides data ... existing competing approaches. Furthermore, the proxy re-encryption scheme we propose in this paper...
  • Game_Based_Crypto

  • Referenced in 1 article [sw38015]
  • specify game-based cryptographic security notions and formally prove secure several cryptographic constructions from ... random function, an unpredictable function, and of encryption schemes that are indistinguishable under chosen plaintext...
  • BIGEBRA

  • Referenced in 21 articles [sw00078]
  • Clifford and Graßmann Hopf algebras via the BIGEBRA...
  • CLIFFORD

  • Referenced in 84 articles [sw00131]
  • CLIFFORD performs various computations in Grass mann and...
  • Coq

  • Referenced in 1890 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • HERMES: An Automatic Tool for Verification of Secrecy...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5373 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...