-
miTLS
- Referenced in 3 articles
[sw27823]
- main components, such as authenticated stream encryption for the record layer and key establishment...
-
FAN
- Referenced in 1 article
[sw40834]
- paper, we propose a new lightweight authenticated encryption with additional data (AEAD) algorithm, named ... security and up to 72-bit authentication tag with the IV-respecting restriction. It consists...
-
Alred
- Referenced in 1 article
[sw20410]
- message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
-
Marvin
- Referenced in 1 article
[sw20412]
- message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
-
LetterSoup
- Referenced in 1 article
[sw20413]
- message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
-
DryGASCON
- Referenced in 1 article
[sw42325]
- DryGASCON scheme was one of authenticated encryption (AE) algorithms submitted to the ongoing NIST Lightweight ... reuse of nonce. Our results threaten the authenticity and robustness of DryGASCON. However, thanks...
-
RSAREF
- Referenced in 2 articles
[sw18334]
- software developer’s library of popular encryption and authentication algorithms. The name ”RSAREF” means...
-
ARMADILLO
- Referenced in 7 articles
[sw08371]
- This could either authenticate a peer or hash 48 bits, or encrypt 128 bits...
-
HACL*
- Referenced in 5 articles
[sw36852]
- ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC message authentication...
-
DNSCurve
- Referenced in 1 article
[sw22847]
- attacker who cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ... easily forge DNS records. DNSCurve cryptographically authenticates all DNS responses, eliminating forged DNS packets. Availability ... part of a larger project to encrypt and authenticate all Internet packets. The techniques used...
-
M-TREE
- Referenced in 14 articles
[sw02565]
- MTREE architecture uses a novel hierarchical Message Authentication Code Tree (MACTree) for protecting applications’ integrity ... introduces a new one-time-pad class encryption mechanism that accelerates security computation over...
-
ProVerif
- Referenced in 45 articles
[sw06558]
- primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman ... adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more generally correspondence properties...
-
curl
- Referenced in 2 articles
[sw16063]
- better performance, support for encryption (https, ftps), gzip compression, authentication, and other libcurl goodies...
-
SCTP
- Referenced in 2 articles
[sw03483]
- solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption...
-
CAKE
- Referenced in 4 articles
[sw23884]
- attack against MDPC decoding of the corresponding encryption scheme and (b) a highly efficient ... MDPC-based cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which...
-
CycurLIB
- Referenced in 1 article
[sw09831]
- determine the authenticity of the origin of data or by encrypting data to ensure confidentiality...
-
SSUKey
- Referenced in 1 article
[sw34179]
- more websites adopt private keys to authenticate users or sign digital payments in e-commerce ... cryptography provider, apply it to file encryption and Transport Layer Security (TLS) download, and evaluate...
-
Coq
- Referenced in 1906 articles
[sw00161]
- Coq is a formal proof management system. It...
-
FGb
- Referenced in 247 articles
[sw00286]
- FGb/Gb libraryGb is a program (191 420 lines...
-
Magma
- Referenced in 3363 articles
[sw00540]
- Computer algebra system (CAS). Magma is a large...