• miTLS

  • Referenced in 3 articles [sw27823]
  • main components, such as authenticated stream encryption for the record layer and key establishment...
  • FAN

  • Referenced in 1 article [sw40834]
  • paper, we propose a new lightweight authenticated encryption with additional data (AEAD) algorithm, named ... security and up to 72-bit authentication tag with the IV-respecting restriction. It consists...
  • Alred

  • Referenced in 1 article [sw20410]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
  • Marvin

  • Referenced in 1 article [sw20412]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
  • LetterSoup

  • Referenced in 1 article [sw20413]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
  • DryGASCON

  • Referenced in 1 article [sw42325]
  • DryGASCON scheme was one of authenticated encryption (AE) algorithms submitted to the ongoing NIST Lightweight ... reuse of nonce. Our results threaten the authenticity and robustness of DryGASCON. However, thanks...
  • RSAREF

  • Referenced in 2 articles [sw18334]
  • software developer’s library of popular encryption and authentication algorithms. The name ”RSAREF” means...
  • ARMADILLO

  • Referenced in 7 articles [sw08371]
  • This could either authenticate a peer or hash 48 bits, or encrypt 128 bits...
  • HACL*

  • Referenced in 5 articles [sw36852]
  • ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC message authentication...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • attacker who cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ... easily forge DNS records. DNSCurve cryptographically authenticates all DNS responses, eliminating forged DNS packets. Availability ... part of a larger project to encrypt and authenticate all Internet packets. The techniques used...
  • M-TREE

  • Referenced in 14 articles [sw02565]
  • MTREE architecture uses a novel hierarchical Message Authentication Code Tree (MACTree) for protecting applications’ integrity ... introduces a new one-time-pad class encryption mechanism that accelerates security computation over...
  • ProVerif

  • Referenced in 45 articles [sw06558]
  • primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman ... adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more generally correspondence properties...
  • curl

  • Referenced in 2 articles [sw16063]
  • better performance, support for encryption (https, ftps), gzip compression, authentication, and other libcurl goodies...
  • SCTP

  • Referenced in 2 articles [sw03483]
  • solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption...
  • CAKE

  • Referenced in 4 articles [sw23884]
  • attack against MDPC decoding of the corresponding encryption scheme and (b) a highly efficient ... MDPC-based cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which...
  • CycurLIB

  • Referenced in 1 article [sw09831]
  • determine the authenticity of the origin of data or by encrypting data to ensure confidentiality...
  • SSUKey

  • Referenced in 1 article [sw34179]
  • more websites adopt private keys to authenticate users or sign digital payments in e-commerce ... cryptography provider, apply it to file encryption and Transport Layer Security (TLS) download, and evaluate...
  • Coq

  • Referenced in 1906 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • Magma

  • Referenced in 3363 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...