• LSIC

  • Referenced in 11 articles [sw14939]
  • propose new Latin square image encryption primitives including Latin Square Whitening, Latin Square ... Square P-box; (2) we develop probabilistic image encryption by embedding random noise into...
  • OTRU

  • Referenced in 3 articles [sw32108]
  • high speed probabilistic multi-dimensional public key cryptosystem that encrypts eight data vectors in each...
  • CertiCrypt

  • Referenced in 6 articles [sw09443]
  • which it is proved, are expressed using probabilistic programs. It provides a set of programming ... describe its application to signature and encryption schemes. This paper describes programming language techniques that...
  • Coq

  • Referenced in 1890 articles [sw00161]
  • Coq is a formal proof management system. It...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • HERMES: An Automatic Tool for Verification of Secrecy...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5373 articles [sw00545]
  • The result of over 30 years of cutting...
  • MapReduce

  • Referenced in 263 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • PARI/GP

  • Referenced in 636 articles [sw00680]
  • PARI/GP is a widely used Computer Algebra System...
  • SageMath

  • Referenced in 1994 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 522 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...
  • JPEG2000

  • Referenced in 64 articles [sw02062]
  • The JPEG 2000 Suite provides a comprehensive overview...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • SPINS

  • Referenced in 49 articles [sw02657]
  • Wireless sensor networks will be widely deployed in...
  • AVISPA

  • Referenced in 87 articles [sw03172]
  • AVISPA (Automated Validation of Internet Security Protocols and...
  • CUDA

  • Referenced in 1325 articles [sw03258]
  • The NVIDIA® CUDA® Toolkit provides a comprehensive development...
  • PVS

  • Referenced in 629 articles [sw03484]
  • PVS is a verification system: that is, a...