• SSUKey

  • Referenced in 1 article [sw34179]
  • against the vulnerabilities of OS. Firstly, threshold cryptography (TC) is employed to partition the private...
  • PALISADE

  • Referenced in 1 article [sw37921]
  • project that provides efficient implementations of lattice cryptography building blocks and leading homomorphic encryption schemes ... quantum public-key encryption, proxy re-encryption, threshold FHE for multiparty computations, identity-based encryption...
  • Coq

  • Referenced in 1890 articles [sw00161]
  • Coq is a formal proof management system. It...
  • GAP

  • Referenced in 3189 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Isabelle

  • Referenced in 713 articles [sw00454]
  • Isabelle is a generic proof assistant. It allows...
  • LAPACK

  • Referenced in 1702 articles [sw00503]
  • LAPACK is written in Fortran 90 and provides...
  • Macaulay2

  • Referenced in 1923 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...
  • Maple

  • Referenced in 5373 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • RANLUX

  • Referenced in 56 articles [sw00778]
  • RANLUX: a Fortran implementation of the high-quality...
  • Scilab

  • Referenced in 173 articles [sw00834]
  • Scilab includes hundreds of mathematical functions. It has...
  • SINGULAR

  • Referenced in 1508 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • TISEAN

  • Referenced in 170 articles [sw00967]
  • Practical implementation of nonlinear time series methods: The...
  • PRISM

  • Referenced in 442 articles [sw01186]
  • PRISM: Probabilistic symbolic model checker. In this paper...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • A universally composable secure channel based on the...
  • CUDA

  • Referenced in 1325 articles [sw03258]
  • The NVIDIA® CUDA® Toolkit provides a comprehensive development...