-
ProVerif
- Referenced in 43 articles
[sw06558]
- different cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions...
-
NanoECC
- Referenced in 10 articles
[sw19226]
- been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes...
-
McBits
- Referenced in 9 articles
[sw14754]
- extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks...
-
eBATS
- Referenced in 5 articles
[sw13007]
- Users of public-key cryptography have a choice of public-key cryptosystems, including...
-
HMQV
- Referenced in 80 articles
[sw02714]
- authenticated Diffie-Hellman protocols that use public-key authentication. In addition to great performance ... key exchange mechanism underlying “the next generation cryptography to protect US government information”. One question...
-
ring-LWE
- Referenced in 32 articles
[sw19028]
- realizing the full potential of ring-based cryptography has so far been hindered ... develop two illustrative applications: a public-key cryptosystem and a “somewhat homomorphic” symmetric encryption scheme...
-
Circuits
- Referenced in 1 article
[sw38919]
- topic of great relevance to cryptography. Optimization of circuits leads to efficiency improvement ... such as for symmetric-key and public-key cryptography, zero-knowledge proofs and secure multi...
-
PyACA
- Referenced in 1 article
[sw36983]
- codes and McEliece cryptography. The 40-year old McEliece public-key cryptosystem is revisited with...
-
MiniLEGO
- Referenced in 13 articles
[sw09866]
- specific number-theoretic assumption and requires public-key operations per gate of the circuit ... only primitives from Minicrypt (i.e., private-key cryptography) per gate in the circuit (hence...
-
Hydra
- Referenced in 1 article
[sw25438]
- cryptography and cryptanalysis. Pairing computation is more complicated compared to that of other popular public ... key cryptosystems. Efficient implementation of cryptographic pairing, both software- and hardware-based approaches, has thus...
-
PALISADE
- Referenced in 1 article
[sw37921]
- project that provides efficient implementations of lattice cryptography building blocks and leading homomorphic encryption schemes ... development. PALISADE also provides post-quantum public-key encryption, proxy re-encryption, threshold...
-
BCiC
- Referenced in 1 article
[sw26749]
- combines language-based proof methods with public-key digital signatures. BCiC aims to augment ... logical facts between hosts, and a cryptography module for generating and checking signatures. The implementation...
-
Game_Based_Crypto
- Referenced in 1 article
[sw38015]
- Game_Based_Crypto: Game-based cryptography in HOL. In this AFP entry, we show ... Elgamal and hashed Elgamal public-key encryption scheme and correctness and security of several constructions...
-
FGb
- Referenced in 247 articles
[sw00286]
- FGb/Gb libraryGb is a program (191 420 lines...
-
GAP
- Referenced in 3189 articles
[sw00320]
- GAP is a system for computational discrete algebra...
-
gmp
- Referenced in 282 articles
[sw00363]
- GMP is a free library for arbitrary precision...
-
LiDIA
- Referenced in 53 articles
[sw00518]
- LiDIA: A library for computational number theory. LiDIA...
-
LinBox
- Referenced in 41 articles
[sw00522]
- LinBox: A Generic Library for Exact Linear Algebra...
-
Magma
- Referenced in 3315 articles
[sw00540]
- Computer algebra system (CAS). Magma is a large...