• OOABKS

  • Referenced in 1 article [sw33540]
  • analysis demonstrates that our scheme can achieve trapdoor unlinkability, keyword security, data privacy security ... controllability. Efficiency analysis shows, in terms of functionalities and the computation overhead, OOABKS is more...
  • ANONIZE

  • Referenced in 1 article [sw30298]
  • implied by the existence of enhanced trapdoor permutations in the CRS model); apracticalinstantiationofourabstractprotocol,calledanonize,whichisprovably ... scale secure computation protocol (of non-trivial functionalities) that can scale to millions of users...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • LiDIA

  • Referenced in 53 articles [sw00518]
  • LiDIA: A library for computational number theory. LiDIA...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • NTL

  • Referenced in 220 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • McEliece

  • Referenced in 250 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • FLASH, a fast multivariate signature algorithm. This article...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • The MQV protocol of Law, Menezes, Qu, Solinas...
  • NAXOS

  • Referenced in 73 articles [sw03050]
  • LaMacchia, Lauter and Mityagin recently presented a strong...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • A universally composable secure channel based on the...
  • CMQV+

  • Referenced in 38 articles [sw06418]
  • CMQV+: an authenticated key exchange protocol from CMQV...
  • PRESENT

  • Referenced in 179 articles [sw08313]
  • PRESENT is a new ultra lightweight block cipher...
  • Keccak

  • Referenced in 80 articles [sw09834]
  • Keccak is a family of sponge functions. The...
  • MiniLEGO

  • Referenced in 13 articles [sw09866]
  • Minilego: efficient secure two-party computation from general...
  • SWIFFT

  • Referenced in 48 articles [sw11588]
  • SWIFFT: A modest proposal for FFT hashing. We...
  • NTRU

  • Referenced in 182 articles [sw11761]
  • NTRU: A ring-based public key cryptosystem. We...
  • NTRUSign

  • Referenced in 41 articles [sw11764]
  • NTRUSign: Digital signatures using the NTRU lattice. We...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • CBEAM: efficient authenticated encryption from feebly one-way...
  • Midori

  • Referenced in 27 articles [sw17436]
  • Midori: a block cipher for low energy. In...