• eBACS

  • Referenced in 39 articles [sw09828]
  • Measurements of public-key Diffie–Hellman secret-sharing systems, indexed by machine: eBATS (ECRYPT Benchmarking ... eBATS for public-key Diffie–Hellman secret-sharing systems...
  • VIFF

  • Referenced in 15 articles [sw05804]
  • multiplication, and comparison, all with Shamir secret shared outputs...
  • Sharemind

  • Referenced in 13 articles [sw22617]
  • privacy-preserving data processing that relies on share computing techniques. This is a standard ... choice of the secret sharing scheme and the design of the protocol suite. We have...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • encryption software, and public-key-secret-sharing software. Submitted BATs (Benchmarkable Asymmetric Tools) are measured...
  • Wysteria

  • Referenced in 4 articles [sw41618]
  • with built-in support for secret shares and with wire bundles, a new abstraction that...
  • PICCO

  • Referenced in 3 articles [sw38132]
  • compiled programs is based on linear secret sharing, achieving efficiency and information-theoretical security...
  • nielsen

  • Referenced in 1 article [sw24983]
  • Analysis of secret sharing schemes based on Nielsen transformations. We investigate security properties ... secret-sharing protocols proposed by Fine, Moldenhauer, and Rosenberger in Sections ... shares reduces the space of possible values of a secret to a set of polynomial...
  • MP-SPDZ

  • Referenced in 1 article [sw41259]
  • computation based on three-party replicated secret sharing as well as Shamir’s secret sharing...
  • MPyC

  • Referenced in 1 article [sw41608]
  • cryptographic protocols are based on threshold secret sharing over finite fields (using Shamir’s threshold ... scheme as well as pseudorandom secret sharing). The details of the secure computation protocols...
  • EDSL

  • Referenced in 1 article [sw22616]
  • same programming language. The secret sharing execution platform provides information-theoretic security against colluding servers...
  • PrivEdge

  • Referenced in 1 article [sw32540]
  • clear would reveal private information, PrivEdge secret-shares the parameters among two non-colluding MLaaS...
  • ProVerif

  • Referenced in 42 articles [sw06558]
  • handle many different cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash ... properties: secrecy (the adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more...
  • Geppetto

  • Referenced in 10 articles [sw31791]
  • Multi QAPs, Geppetto reduces the cost of sharing state between computations (e.g, For MapReduce ... verifies the correct execution of proprietary (i.e, Secret) algorithms. Finally, Geppetto’s use of energy...
  • TransCrypt

  • Referenced in 1 article [sw37371]
  • Minimal ARM Hypervisor. Attacks on memory, revealing secrets, for example, via DMA or cold boot ... correct system functionality, for example, for pages shared with peripheral devices. The detailed evaluation using ... that TransCrypt is able to effectively protect secrets in memory while keeping the performance impact...
  • startup

  • Referenced in 0 articles [sw17753]
  • secret environment variables separate from other environment variables. It also makes it easier to share...
  • ARMS

  • Referenced in 65 articles [sw00048]
  • ARMS: an algebraic recursive multilevel solver for general...
  • GAP

  • Referenced in 3154 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...