• FGb

  • Referenced in 246 articles [sw00286]
  • wide range of problems in Cryptology (for instance, FGb was explicitly used...
  • Casper

  • Referenced in 95 articles [sw06559]
  • fake messages, but not perform any cryptological attacks...
  • QUAD

  • Referenced in 15 articles [sw19553]
  • Berbain} et al. [in: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • European Network of Excellence for Cryptology (ECRYPT), funded within the Information Societies Technology Programme...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • Japan Joint Workshop on Information Security and Cryptology...
  • DLCT

  • Referenced in 1 article [sw31786]
  • Blondeau, Leander, and Nyberg (Journal of Cryptology, 2017) which obtained an accurate expression under...
  • SBOXDiscovery

  • Referenced in 1 article [sw39003]
  • Gate Count of Bitslice DES.” IACR Cryptology ePrint Archive 2000 (2000): 51. with heavy modification...
  • GAP

  • Referenced in 3068 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Magma

  • Referenced in 3137 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5296 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6235 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • SageMath

  • Referenced in 1859 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SINGULAR

  • Referenced in 1472 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • McEliece

  • Referenced in 242 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • NESSIE

  • Referenced in 5 articles [sw02725]
  • NESSIE: A European approach to evaluate cryptographic algorithms...
  • Mizar

  • Referenced in 480 articles [sw04704]
  • The Mizar System is the only implementation of...
  • Knapsack

  • Referenced in 480 articles [sw04723]
  • Knapsack problems are the simplest NP-hard problems...
  • JavaScript

  • Referenced in 164 articles [sw06868]
  • JavaScript is a scripting language for computers. It...
  • Camellia

  • Referenced in 88 articles [sw09731]
  • Camellia: a 128-bit block cipher and suitable...
  • PrivateLR

  • Referenced in 79 articles [sw11354]
  • PrivateLR: Differentially Private Regularized Logistic Regression. PrivateLR implements...