MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library). Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) is a C software library for implementing number-theoretic based methods of cryptography. While there are many libraries out there that support Cryptography on a PC, MIRACL does more by securing embedded-devices and mobile smart devices like no other SDK in the global market today. For developers who have found other cryptographic libraries ill-suited for these constrained platforms, MIRACL is your answer. MIRACL is particularly adept at methods based on Elliptic Curves, and the new paradigm of Pairing-Based Cryptography. (Source: http://mathres.kevius.com/software.htm)

References in zbMATH (referenced in 30 articles )

Showing results 1 to 20 of 30.
Sorted by year (citations)

1 2 next

  1. Alimoradi, Reza; Arkian, Hamid Reza; Razavian, Seiied-Mohammad-Javad; Ramzi, Ali: Scalar multiplication in elliptic curve libraries (2021)
  2. Wu, Libing; Zhang, Yubo; Choo, Kim-Kwang Raymond; He, Debiao: Pairing-free identity-based encryption with authorized equality test in online social networks (2019)
  3. Nascimento, Erick; Chmielewski, Łukasz; Oswald, David; Schwabe, Peter: Attacking embedded ECC implementations through CMOV side channels (2017)
  4. Hinterwälder, Gesine; Moradi, Amir; Hutter, Michael; Schwabe, Peter; Paar, Christof: Full-size high-security ECC implementation on MSP430 microcontrollers (2015)
  5. Kumar, Neeraj; Iqbal, Rahat; Misra, Sudip; Rodrigues, Joel J. P. C.: An intelligent approach for building a secure decentralized public key infrastructure in VANET (2015)
  6. Martin, Daniel P.; Oswald, Elisabeth; Stam, Martijn; Wójcik, Marcin: A leakage resilient MAC (2015)
  7. Wang, Ding; Wang, Nan; Wang, Ping; Qing, Sihan: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity (2015)
  8. Brogle, Kyle; Goldberg, Sharon; Reyzin, Leonid: Sequential aggregate signatures with lazy verification from trapdoor permutations (2014)
  9. Chuengsatiansup, Chitchanok; Naehrig, Michael; Ribarski, Pance; Schwabe, Peter: PandA: pairings and arithmetic (2014)
  10. Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang: Towards semantically secure outsourcing of association rule mining on categorical data (2014)
  11. Pu, Shi; Liu, Jyh-Charn: EAGL: an elliptic curve arithmetic GPU-based library for bilinear pairing (2014)
  12. Gómez Pardo, José Luis: Introduction to cryptography with Maple (2013)
  13. Li, Jiguo; Wang, Zhiwei; Zhang, Yichen: Provably secure certificate-based signature scheme without pairings (2013)
  14. Hu, Zhi; Longa, Patrick; Xu, Maozhi: Implementing the 4-dimensional GLV method on GLS elliptic curves with (j)-invariant 0 (2012)
  15. Wang, Boyang; Li, Hui; Cao, Jin: An efficient MAC scheme for secure network coding with probabilistic detection (2012)
  16. D’Souza, Roy; Jao, David; Mironov, Ilya; Pandey, Omkant: Publicly verifiable secret sharing for cloud-based key management (2011)
  17. Galbraith, Steven D.; Lin, Xibin; Scott, Michael: Endomorphisms for faster elliptic curve cryptography on a large class of curves (2011)
  18. Scott, Michael: On the efficient implementation of pairing-based protocols (2011)
  19. Aranha, Diego F.; Dahab, Ricardo; López, Julio; Oliveira, Leonardo B.: Efficient implementation of elliptic curve cryptography in wireless sensors (2010)
  20. Zhou, Zhenghua; Hu, Zhi; Xu, Maozhi; Song, Wangan: Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves (2010)

1 2 next