• EMD

  • Referenced in 243 articles [sw14902]
  • between two distributions, which are represented by signatures. The signatures are sets of weighted features ... amount of work needed to change one signature into the other. The notion of ”work ... features. The size of the two signatures can be different. Also, the sum of weights ... signature can be different than the sum of weights of the other (partial match). Because...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • form of “challenge-response signatures”, derived from the Schnorr identification scheme, that have the property ... challenger and signer can compute the same signature; the former by having chosen the challenge ... latter by knowing the private signature...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • FLASH, a fast multivariate signature algorithm. This article describes the particular parameter choice and implementation ... rare published, but not broken signature schemes, that allow signatures to be computed and checked ... submissions to NESSIE (New European Schemes for Signatures, Integrity, and Encryption), a project within...
  • NTRUSign

  • Referenced in 43 articles [sw11764]
  • NTRUSign: Digital signatures using the NTRU lattice. We introduce NTRUSign, a new family of signature ... properties of general APPR-CVP based signature schemes (e.g. GGH) and show that they ... obtainable from an analysis of a large signature transcript. In the case of NTRUSign this...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • attacks (IND-P2-C2) along with secure signatures and ideal certification authority are sufficient...
  • Gaigen

  • Referenced in 36 articles [sw04958]
  • experimentation, many geometric algebras with different dimensionality, signatures and other properties may be required. Instead ... basis vectors, all 3 signatures are supported (-1, 0, +1). It is also possible...
  • F5C

  • Referenced in 30 articles [sw35035]
  • efficiency through the careful analysis of signatures assigned to each computed polynomial. However, it computes ... trivial task, because they correspond to signatures required for reduction. This paper revisits the theory ... that prunes redundant polynomials, then re-computes signatures to preserve correctness. This strategy successfully reduces...
  • ProVerif

  • Referenced in 43 articles [sw06558]
  • shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman key agreements...
  • ESIGN

  • Referenced in 23 articles [sw02120]
  • ESIGN is an efficient digital signature algorithm [OkS], [Ok], whose computation speed is more than ... scheme, while its key length and signature length are comparable to those ... card. This realizes a computation time for signature generation of about 0.2 seconds. To achieve ... this remarkable speed for signature generation, appropriate implementation techniques such as pre-computation and table...
  • WSAT

  • Referenced in 37 articles [sw01022]
  • service itself (invocation interface and behavior signature) relies on a stack of XML based standards...
  • F2PY

  • Referenced in 35 articles [sw04610]
  • C/API modules from (handwritten or F2PY generated) signature files (or directly from Fortran sources...
  • Polygraph

  • Referenced in 17 articles [sw23932]
  • Polygraph: automatically generating signatures for polymorphic worms. It is widely believed that content-signature-based ... this paper, we present Polygraph, a signature generation system that successfully produces signatures that match ... polymorphic worms. Polygraph generates signatures that consist of multiple disjoint content substrings. In doing ... contribute a definition of the polymorphic signature generation problem; propose classes of signature suited...
  • BEASY

  • Referenced in 34 articles [sw01168]
  • computer simulation for Corrosion Control, Galvanic Corrosion, Signature Management, Defect Assessment and Crack Growth Simulation...
  • Autograph

  • Referenced in 16 articles [sw23929]
  • Autograph: toward automated, distributed worm signature detection. Today’s Internet intrusion detection systems (IDSes) monitor ... novel Internet worms. Generation of the worm signatures required by an IDS--the byte patterns ... study packet traces to produce a worm signature. Yet intervention must occur early ... Autograph is a system that automatically generates signatures for novel Internet worms that propagate using...
  • PIPER

  • Referenced in 28 articles [sw11478]
  • tool – PIPER. PIPER exploits type signatures provided by the programmer to partition the model checking...
  • SIGREF

  • Referenced in 15 articles [sw00859]
  • present a uniform signature-based approach to compute the most popular bisimulations. Our approach ... handling of very large transition systems. Signatures for the bisimulations are built up from ... operations. Thus, the definition of an appropriate signature is the key for a rapid development...
  • BLISS

  • Referenced in 24 articles [sw02301]
  • BLISS: Bimodal Lattice Signature Schemes. This implementation in C++ requires NTL and is strictly...
  • TinyECC

  • Referenced in 20 articles [sw09089]
  • sensor network applications. It provides a digital signature scheme (ECDSA), a key exchange protocol (ECDH...
  • SMT-RAT

  • Referenced in 19 articles [sw13091]
  • quantifier-free formulas built over a signature of uninterpreted sort and function symbols...
  • SPHINCS

  • Referenced in 9 articles [sw24824]
  • SPHINCS+ is a stateless hash-based signature scheme, which was submitted to the NIST post ... crypto project. The design advances the SPHINCS signature scheme, which was presented at EUROCRYPT ... incorporates multiple improvements, specifically aimed at reducing signature size. For a quick overview ... Andreas Hülsing. The submission proposes three different signature schemes: SPHINCS+-SHAKE256; SPHINCS+-SHA-256; SPHINCS...