• McEliece

  • Referenced in 250 articles [sw02076]
  • interest on implementing post-quantum cryptographic algorithms, e.g. McEliece, on microprocessor-based platforms has been...
  • LED

  • Referenced in 53 articles [sw18983]
  • PHOTON are new ultra-lightweight cryptographic algorithms aiming at resource-constrained devices. In this article...
  • STP

  • Referenced in 44 articles [sw34795]
  • tools, theorem provers, automated bug finders, cryptographic algorithms, intelligent fuzzers and model checkers. Features: Easy...
  • PRESENT

  • Referenced in 179 articles [sw08313]
  • ultra lightweight block cipher algorithm, developed by the Orange Labs (France), Ruhr University Bochum (Germany ... international standard for lightweight cryptographic methods...
  • CLEFIA

  • Referenced in 66 articles [sw03047]
  • algorithm specification of CLEFIA is publicly available to enable public evaluations by cryptographers in worldwide...
  • ATHENa

  • Referenced in 7 articles [sw29717]
  • benchmarking methodologies allow the comparison of: Cryptographic algorithms, e.g. candidates...
  • Falcon

  • Referenced in 7 articles [sw31410]
  • point of a post-quantum cryptographic algorithm is to keep on ensuring its security characteristics...
  • liboqs

  • Referenced in 4 articles [sw25375]
  • library for quantum-resistant cryptographic algorithms. This branch of liboqs focuses on incorporating submissions ... source C library for quantum-resistant cryptographic algorithms, and prototype integrations into protocols and applications...
  • NESSIE

  • Referenced in 5 articles [sw02725]
  • NESSIE: A European approach to evaluate cryptographic algorithms. The NESSIE project (New European Schemes ... portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security...
  • ObliVM

  • Referenced in 5 articles [sw29146]
  • such as data mining, streaming algorithms, graph algorithms, genomic data analysis, and data structures ... framework to implement and distribute new cryptographic algorithms...
  • PHOTON

  • Referenced in 5 articles [sw13048]
  • PHOTON are new ultra-lightweight cryptographic algorithms aiming at resource-constrained devices. In this article...
  • MIST

  • Referenced in 18 articles [sw02431]
  • also infeasible. The algorithm is particularly well suited to cryptographic functions which depend on exponentiation ... efficient than the normal square-and-multiply algorithm and uses less memory than...
  • Saturnin

  • Referenced in 4 articles [sw41873]
  • algorithms for post-quantum security. The cryptographic algorithms needed to ensure the security...
  • ring-LWE

  • Referenced in 32 articles [sw19028]
  • have made it possible to design cryptographic schemes whose efficiency is competitive with that ... been hindered by a lack of practical algorithms and analytical tools for working in this ... introducing a toolkit of fast, modular algorithms and analytical techniques that can be used ... wide variety of ring-based cryptographic applications, particularly those built around ring-LWE. Our techniques...
  • SUPERCOP

  • Referenced in 2 articles [sw10474]
  • SUPERCOP is a benchmarking framework for cryptographic algorithms like ciphers and hash functions. It automatically ... benchmarks algorithms across several implementations, compilers, compiler options and input data lengths. Since ... Cards are important target platforms for cryptographic algorithms. The work presented in this paper extends...
  • miTLS

  • Referenced in 3 articles [sw27823]
  • down to computational assumptions on its cryptographic algorithms. The stable version of miTLS including ... typechecker. To this end, we equip each cryptographic primitive and construction of TLS with...
  • Crypto++

  • Referenced in 13 articles [sw11765]
  • class library of cryptographic schemes. Currently the library contains the following algorithms...
  • Quark

  • Referenced in 22 articles [sw08447]
  • implement cryptographic protocols in RFID technology. At the time of writing, however, no algorithm exists...
  • Apte

  • Referenced in 6 articles [sw20604]
  • website for the automatic cryptographic protocol verifier APTE: Algorithm for Proving Trace Equivalence. This tool ... Trace equivalence can be used to model cryptographic security properties such that privacy, anonymity, unlinkability...
  • YAARX

  • Referenced in 1 article [sw24207]
  • toolkit for the analysis of ARX cryptographic algorithms. YAARX is a set of programs ... differential analysis of ARX cryptographic algorithms. The latter represent a broad class of symmetric...