Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,541,939 papers from all fields of science
Search
Sign In
Create Free Account
Crypto++
Known as:
Crypto
Crypto++ (also known as CryptoPP, libcrypto++, and libcryptopp) is a free and open source C++ class library of cryptographic algorithms and schemes…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
32-bit
AES instruction set
AIX
Advanced Encryption Standard process
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms
Meghna H. Vekariya
2015
Corpus ID: 195918054
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological…
Expand
2014
2014
Matters of Coercion-Resistance in Cryptographic Voting Schemes
Carmen Kempka
2014
Corpus ID: 43826688
Electronic voting has gained more and more interest during the last decades. It promises less error-prone and faster tallying…
Expand
2012
2012
On the Security of Black-Box Implementation of Visual Secret Sharing Schemes
Adrian Atanasiu
,
Ruxandra F. Olimid
,
E. Simion
2012
Corpus ID: 62408984
Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However…
Expand
2012
2012
Portability Evaluation of Cryptographic Libraries on Android Smartphones
A. Braga
,
Erick N. Nascimento
International Conference on Cryptography and…
2012
Corpus ID: 8711016
This paper shows the results of an investigation of cryptographic services for mobile devices running Android. The objective of…
Expand
2010
2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC
Shin'ichiro Matsuo
,
K. Miyazaki
,
Akira Otsuka
,
D. Basin
Financial Cryptography Workshops
2010
Corpus ID: 17767326
Governments and international standards bodies have established certification procedures for security-critical technologies, such…
Expand
2009
2009
Linguistic Cryptographic Threshold Schemes
M. Ogiela
,
Urszula Ogiela
2009
Corpus ID: 17345994
In this paper a new way of secret sharing algorithms expansion based on additional, linguistic stage, introduced for the…
Expand
2009
2009
DNA Cryptographic Algorithms
O. Tornea
,
M. Borda
2009
Corpus ID: 60791184
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A—T, C—G) offer the possibility to…
Expand
2009
2009
Design and Analysis of Interconnection Network of Reconfigurable Cryptographic Processor
Qu Yingjie
Second International Workshop on Computer Science…
2009
Corpus ID: 14192052
The reconfigurable cryptographic processor is an integrated circuit that is used for data encryption or decryption. The logic…
Expand
2004
2004
Towards fault-tolerant cryptographic computations over finite fields
A. Reyhani-Masoleh
,
M. A. Hasan
TECS
2004
Corpus ID: 13090883
Cryptographic schemes, such as authentication, confidentiality, and integrity, rely on computations in very large finite fields…
Expand
Highly Cited
1995
Highly Cited
1995
Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance
R. Lercier
,
F. Morain
International Conference on the Theory and…
1995
Corpus ID: 10327110
Cryptographic schemes using elliptic curves over finite fields require the computation of the cardinality of the curves. Dramatic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE