• KEM-DEM

  • Referenced in 59 articles [sw03093]
  • Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism ... formalization of asymmetric encryption specified for key distribution, and DEM is a formalization of symmetric...
  • FrodoKEM

  • Referenced in 17 articles [sw35260]
  • FrodoKEM: Practical quantum-secure key encapsulation from generic lattices. FrodoKEM is a family ... key-encapsulation mechanisms that are designed to be conservative yet practical post-quantum constructions whose...
  • OOPIC

  • Referenced in 20 articles [sw12503]
  • particle position update. The architecture encapsulates key PIC algorithms and data into objects, simplifying extensions...
  • BIKE

  • Referenced in 6 articles [sw37684]
  • BIKE: Bit Flipping Key Encapsulation. BIKE is a code-based key encapsulation mechanism based...
  • Saber

  • Referenced in 6 articles [sw25250]
  • finally into an IND-CCA secure key encapsulation mechanism using a post-quantum version ... 101K, 125K and 129K cycles for key generation, encapsulation and decapsulation respectively on a Dell...
  • CAKE

  • Referenced in 4 articles [sw23884]
  • CAKE: CODE-based algorithm for key encapsulation. Current widely-used key exchange (KE) mechanisms will ... goal. First, we introduce “CAKE”, a key encapsulation algorithm based on the QC-MDPC McEliece ... major improvements: (a) the use of ephemeral keys that defeats a recent reaction attack against...
  • LEDAkem

  • Referenced in 4 articles [sw31287]
  • LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. This work presents ... code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem ... speeds and compact keypairs. LEDAkem uses ephemeral keys to foil known statistical attacks, and takes...
  • PQM4

  • Referenced in 4 articles [sw34496]
  • currently contains implementations post-quantum key-encapsulation mechanisms and post-quantum signature schemes targeting...
  • Backflip

  • Referenced in 2 articles [sw37683]
  • MDPC code-based KEM Bit Flipping Key Encapsulation (BIKE) is one of the Round ... depends on the input and on the key. This paper proposes a decoder that...
  • OSIRIS

  • Referenced in 31 articles [sw02458]
  • object-oriented design of the code, the encapsulation of system dependent code and the parallelization ... boundary condition problem and other key characteristics of the code, such as the moving window...
  • Kyber

  • Referenced in 1 article [sw36432]
  • implementation of the module-lattice-based key-encapsulation mechanism Kyber for the ARM Cortex...
  • Nmag

  • Referenced in 3 articles [sw22906]
  • future computational science projects. Key lessons include that encapsulating the simulation functionality in a library...
  • Venture

  • Referenced in 10 articles [sw14670]
  • approximate techniques. We also describe four key aspects of Venture’s implementation that build ... stochastic procedure interface (SPI) that specifies and encapsulates primitive random variables. The SPI supports custom...
  • Amulet

  • Referenced in 3 articles [sw36186]
  • graphics and supports automatic refresh. Command objects encapsulate all of the information needed about operations ... various ways to undo them. A key feature of the Amulet design is that...
  • JOSS

  • Referenced in 1 article [sw20857]
  • key contributions to science made in the form of software. JOSS publishes articles that encapsulate...
  • AgriDEM

  • Referenced in 1 article [sw26825]
  • paper. Also, the implementation methods of the key technologies including the modeling method of particle ... computing method based on OpenMP, the module encapsulation method based on DLL and the development...
  • Visiplan

  • Referenced in 2 articles [sw00999]
  • allocation and sequencing problems. Expert knowledge is encapsulated throughout the whole modelling and problem solving ... successfully used for solving combinatorial problems. The key elements of this approach are combined...
  • rsatoolbox

  • Referenced in 1 article [sw32148]
  • investigated with multivariate pattern-information analyses. A key challenge is to use measured brain-activity ... stimuli. The representational distance matrix encapsulates what distinctions between stimuli are emphasized and what distinctions ... both simulated and real fMRI data. The key functions are equally applicable to other modalities...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...