• LEDAkem

  • Referenced in 3 articles [sw31287]
  • presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built ... cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact...
  • Mechanica

  • Referenced in 0 articles [sw18393]
  • morphology and mechanical properties, changes in chemical uptake or secretion, cell differentiation, proliferation, death ... spatial structures, and their coupled dynamics of mechanical, chemical and electrical objects and processes...
  • EmbryoMaker

  • Referenced in 2 articles [sw38801]
  • polarization, apoptosis, contraction, extracellular matrix secretion, signal secretion and reception, etc.). There are several models ... same time the very different bio-mechanical properties of epithelia, mesenchyme, extracellular matrix and their...
  • DeepT3

  • Referenced in 1 article [sw34126]
  • host cells and cause diseases. Since T3SS secreted effectors (T3SEs) play important roles in pathogen ... crucial to our understanding of the pathogenic mechanisms of T3SSs. However, the effectors display high...
  • TransCrypt

  • Referenced in 1 article [sw37371]
  • Minimal ARM Hypervisor. Attacks on memory, revealing secrets, for example, via DMA or cold boot ... present a transparent and guest-agnostic mechanism for recognizing pages to be excluded from encryption ... that TransCrypt is able to effectively protect secrets in memory while keeping the performance impact...
  • PICCO

  • Referenced in 2 articles [sw38132]
  • available tools, however, lacked a convenient mechanism for implementing a general-purposeprogram in a secure ... compiled programs is based on linear secret sharing, achieving efficiency and information-theoretical security...
  • MAC

  • Referenced in 1 article [sw32897]
  • code. Furthermore, we present a full-fledged, mechanically-verified model of MAC. Specifically, we show ... same public output should be produced if secrets are erased before or after program execution...
  • Kyber

  • Referenced in 1 article [sw36432]
  • module-lattice-based key-encapsulation mechanism Kyber for the ARM Cortex-M4 microcontroller. Kyber ... software does not make use of any secret-dependent branches or memory access and thus...
  • gmp

  • Referenced in 274 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Gmsh

  • Referenced in 644 articles [sw00366]
  • Gmsh is a 3D finite element grid generator...
  • Magma

  • Referenced in 3055 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Mathematica

  • Referenced in 6129 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 12721 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 8904 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1792 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SINGULAR

  • Referenced in 1441 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • AUTO

  • Referenced in 911 articles [sw01059]
  • AUTO is a software for continuation and bifurcation...
  • McEliece

  • Referenced in 235 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • HMQV

  • Referenced in 78 articles [sw02714]
  • The MQV protocol of Law, Menezes, Qu, Solinas...
  • NAXOS

  • Referenced in 71 articles [sw03050]
  • LaMacchia, Lauter and Mityagin recently presented a strong...