• ProVerif

  • Referenced in 43 articles [sw06558]
  • different cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions...
  • NanoECC

  • Referenced in 10 articles [sw19226]
  • been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes...
  • McBits

  • Referenced in 9 articles [sw14754]
  • extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • Users of public-key cryptography have a choice of public-key cryptosystems, including...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • authenticated Diffie-Hellman protocols that use public-key authentication. In addition to great performance ... key exchange mechanism underlying “the next generation cryptography to protect US government information”. One question...
  • ring-LWE

  • Referenced in 32 articles [sw19028]
  • realizing the full potential of ring-based cryptography has so far been hindered ... develop two illustrative applications: a public-key cryptosystem and a “somewhat homomorphic” symmetric encryption scheme...
  • Circuits

  • Referenced in 1 article [sw38919]
  • topic of great relevance to cryptography. Optimization of circuits leads to efficiency improvement ... such as for symmetric-key and public-key cryptography, zero-knowledge proofs and secure multi...
  • PyACA

  • Referenced in 1 article [sw36983]
  • codes and McEliece cryptography. The 40-year old McEliece public-key cryptosystem is revisited with...
  • MiniLEGO

  • Referenced in 13 articles [sw09866]
  • specific number-theoretic assumption and requires public-key operations per gate of the circuit ... only primitives from Minicrypt (i.e., private-key cryptography) per gate in the circuit (hence...
  • Hydra

  • Referenced in 1 article [sw25438]
  • cryptography and cryptanalysis. Pairing computation is more complicated compared to that of other popular public ... key cryptosystems. Efficient implementation of cryptographic pairing, both software- and hardware-based approaches, has thus...
  • PALISADE

  • Referenced in 1 article [sw37921]
  • project that provides efficient implementations of lattice cryptography building blocks and leading homomorphic encryption schemes ... development. PALISADE also provides post-quantum public-key encryption, proxy re-encryption, threshold...
  • BCiC

  • Referenced in 1 article [sw26749]
  • combines language-based proof methods with public-key digital signatures. BCiC aims to augment ... logical facts between hosts, and a cryptography module for generating and checking signatures. The implementation...
  • Game_Based_Crypto

  • Referenced in 1 article [sw38015]
  • Game_Based_Crypto: Game-based cryptography in HOL. In this AFP entry, we show ... Elgamal and hashed Elgamal public-key encryption scheme and correctness and security of several constructions...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • GAP

  • Referenced in 3189 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • LiDIA

  • Referenced in 53 articles [sw00518]
  • LiDIA: A library for computational number theory. LiDIA...
  • LinBox

  • Referenced in 41 articles [sw00522]
  • LinBox: A Generic Library for Exact Linear Algebra...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...