• MISTY

  • Referenced in 29 articles [sw24162]
  • basis of the theory of provable security against differential and linear cryptanalysis, and moreover they...
  • QUAD

  • Referenced in 15 articles [sw19553]
  • QUAD: A multivariate stream cipher with provable security. We present the stream cipher QUAD ... provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed...
  • McOE

  • Referenced in 15 articles [sw20876]
  • line and are provably secure against nonce-respecting adversaries. But they fail badly for more ... schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed ... McOE family, it provably guarantees reasonable security against general adversaries as well as standard security...
  • Sharemind

  • Referenced in 13 articles [sw22617]
  • this paper, we present a provably secure and efficient general-purpose computation system to address...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • block cipher inverse and hence enjoys provable security under a weaker assumption about the underlying...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • enhancement technologies. In addition to a provably secure message transfer protocol, we have designed...
  • GRECS

  • Referenced in 2 articles [sw23226]
  • three oracle encryption schemes that are provably secure against any semi-honest server. Our first...
  • RoadRunneR

  • Referenced in 3 articles [sw41023]
  • software, and its security is provable against differential and linear attacks. RoadRunneR has lowest code ... design SPECK, which has no security proof. Moreover, we propose a new metric...
  • ANONIZE

  • Referenced in 1 article [sw30298]
  • surveys and present: an abstract provably-secure implementation based on standard cryptographic building blocks (which...
  • Verificatum

  • Referenced in 1 article [sw41019]
  • open source, and correct implementations of provably secure cryptographic primitives and protocols that are easy...
  • Hamsa

  • Referenced in 5 articles [sw23930]
  • provable attack resilience. Zero-day polymorphic worms pose a serious threat to the security...
  • CryptDB

  • Referenced in 16 articles [sw27061]
  • system that provides practical and provable confidentiality in the face of these attacks for applications ... requires 11-13 unique schema annotations to secure more than 20 sensitive fields...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea ... Japan Joint Workshop on Information Security and Cryptology...
  • Coq

  • Referenced in 1880 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Reveal

  • Referenced in 21 articles [sw00801]
  • We describe the Reveal formal functional verification system...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • ML

  • Referenced in 522 articles [sw01218]
  • ML (’Meta Language’) is a general-purpose functional...