• FGb

  • Referenced in 247 articles [sw00286]
  • wide range of problems in Cryptology (for instance, FGb was explicitly used...
  • Casper

  • Referenced in 95 articles [sw06559]
  • fake messages, but not perform any cryptological attacks...
  • QUAD

  • Referenced in 15 articles [sw19553]
  • Berbain} et al. [in: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • European Network of Excellence for Cryptology (ECRYPT), funded within the Information Societies Technology Programme...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • Japan Joint Workshop on Information Security and Cryptology...
  • DLCT

  • Referenced in 1 article [sw31786]
  • Blondeau, Leander, and Nyberg (Journal of Cryptology, 2017) which obtained an accurate expression under...
  • SBOXDiscovery

  • Referenced in 1 article [sw39003]
  • Gate Count of Bitslice DES.” IACR Cryptology ePrint Archive 2000 (2000): 51. with heavy modification...
  • EthVer

  • Referenced in 1 article [sw42609]
  • Shelat} [``Micropayments for decentralized currencies'', Preprint, Cryptology ePrint Archive, url{https://eprint.iacr.org/2016/332}].$...
  • GAP

  • Referenced in 3222 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Magma

  • Referenced in 3366 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5408 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6458 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • SageMath

  • Referenced in 2047 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SINGULAR

  • Referenced in 1523 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • McEliece

  • Referenced in 265 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • NESSIE

  • Referenced in 5 articles [sw02725]
  • NESSIE: A European approach to evaluate cryptographic algorithms...
  • Mizar

  • Referenced in 507 articles [sw04704]
  • The Mizar System is the only implementation of...
  • Knapsack

  • Referenced in 511 articles [sw04723]
  • Knapsack problems are the simplest NP-hard problems...
  • JavaScript

  • Referenced in 167 articles [sw06868]
  • JavaScript is a scripting language for computers. It...
  • Camellia

  • Referenced in 88 articles [sw09731]
  • Camellia: a 128-bit block cipher and suitable...