• MISTY

  • Referenced in 29 articles [sw24162]
  • basis of the theory of provable security against differential and linear cryptanalysis, and moreover they...
  • QUAD

  • Referenced in 15 articles [sw19553]
  • QUAD: A multivariate stream cipher with provable security. We present the stream cipher QUAD ... provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed...
  • McOE

  • Referenced in 14 articles [sw20876]
  • line and are provably secure against nonce-respecting adversaries. But they fail badly for more ... schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed ... McOE family, it provably guarantees reasonable security against general adversaries as well as standard security...
  • Sharemind

  • Referenced in 13 articles [sw22617]
  • this paper, we present a provably secure and efficient general-purpose computation system to address...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • block cipher inverse and hence enjoys provable security under a weaker assumption about the underlying...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • enhancement technologies. In addition to a provably secure message transfer protocol, we have designed...
  • GRECS

  • Referenced in 2 articles [sw23226]
  • three oracle encryption schemes that are provably secure against any semi-honest server. Our first...
  • ANONIZE

  • Referenced in 1 article [sw30298]
  • surveys and present: an abstract provably-secure implementation based on standard cryptographic building blocks (which...
  • Hamsa

  • Referenced in 5 articles [sw23930]
  • provable attack resilience. Zero-day polymorphic worms pose a serious threat to the security...
  • CryptDB

  • Referenced in 15 articles [sw27061]
  • system that provides practical and provable confidentiality in the face of these attacks for applications ... requires 11-13 unique schema annotations to secure more than 20 sensitive fields...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea ... Japan Joint Workshop on Information Security and Cryptology...
  • Coq

  • Referenced in 1845 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 245 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 275 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Mathematica

  • Referenced in 6166 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Reveal

  • Referenced in 20 articles [sw00801]
  • We describe the Reveal formal functional verification system...
  • SageMath

  • Referenced in 1829 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 517 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...