
McEliece
 Referenced in 250 articles
[sw02076]
 interest on implementing postquantum cryptographic algorithms, e.g. McEliece, on microprocessorbased platforms has been...

LED
 Referenced in 53 articles
[sw18983]
 PHOTON are new ultralightweight cryptographic algorithms aiming at resourceconstrained devices. In this article...

STP
 Referenced in 44 articles
[sw34795]
 tools, theorem provers, automated bug finders, cryptographic algorithms, intelligent fuzzers and model checkers. Features: Easy...

PRESENT
 Referenced in 179 articles
[sw08313]
 ultra lightweight block cipher algorithm, developed by the Orange Labs (France), Ruhr University Bochum (Germany ... international standard for lightweight cryptographic methods...

CLEFIA
 Referenced in 66 articles
[sw03047]
 algorithm specification of CLEFIA is publicly available to enable public evaluations by cryptographers in worldwide...

ATHENa
 Referenced in 7 articles
[sw29717]
 benchmarking methodologies allow the comparison of: Cryptographic algorithms, e.g. candidates...

Falcon
 Referenced in 7 articles
[sw31410]
 point of a postquantum cryptographic algorithm is to keep on ensuring its security characteristics...

liboqs
 Referenced in 4 articles
[sw25375]
 library for quantumresistant cryptographic algorithms. This branch of liboqs focuses on incorporating submissions ... source C library for quantumresistant cryptographic algorithms, and prototype integrations into protocols and applications...

NESSIE
 Referenced in 5 articles
[sw02725]
 NESSIE: A European approach to evaluate cryptographic algorithms. The NESSIE project (New European Schemes ... portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security...

ObliVM
 Referenced in 5 articles
[sw29146]
 such as data mining, streaming algorithms, graph algorithms, genomic data analysis, and data structures ... framework to implement and distribute new cryptographic algorithms...

PHOTON
 Referenced in 5 articles
[sw13048]
 PHOTON are new ultralightweight cryptographic algorithms aiming at resourceconstrained devices. In this article...

MIST
 Referenced in 18 articles
[sw02431]
 also infeasible. The algorithm is particularly well suited to cryptographic functions which depend on exponentiation ... efficient than the normal squareandmultiply algorithm and uses less memory than...

Saturnin
 Referenced in 4 articles
[sw41873]
 algorithms for postquantum security. The cryptographic algorithms needed to ensure the security...

ringLWE
 Referenced in 32 articles
[sw19028]
 have made it possible to design cryptographic schemes whose efficiency is competitive with that ... been hindered by a lack of practical algorithms and analytical tools for working in this ... introducing a toolkit of fast, modular algorithms and analytical techniques that can be used ... wide variety of ringbased cryptographic applications, particularly those built around ringLWE. Our techniques...

SUPERCOP
 Referenced in 2 articles
[sw10474]
 SUPERCOP is a benchmarking framework for cryptographic algorithms like ciphers and hash functions. It automatically ... benchmarks algorithms across several implementations, compilers, compiler options and input data lengths. Since ... Cards are important target platforms for cryptographic algorithms. The work presented in this paper extends...

miTLS
 Referenced in 3 articles
[sw27823]
 down to computational assumptions on its cryptographic algorithms. The stable version of miTLS including ... typechecker. To this end, we equip each cryptographic primitive and construction of TLS with...

Crypto++
 Referenced in 13 articles
[sw11765]
 class library of cryptographic schemes. Currently the library contains the following algorithms...

Quark
 Referenced in 22 articles
[sw08447]
 implement cryptographic protocols in RFID technology. At the time of writing, however, no algorithm exists...

Apte
 Referenced in 6 articles
[sw20604]
 website for the automatic cryptographic protocol verifier APTE: Algorithm for Proving Trace Equivalence. This tool ... Trace equivalence can be used to model cryptographic security properties such that privacy, anonymity, unlinkability...

YAARX
 Referenced in 1 article
[sw24207]
 toolkit for the analysis of ARX cryptographic algorithms. YAARX is a set of programs ... differential analysis of ARX cryptographic algorithms. The latter represent a broad class of symmetric...