Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,336 papers from all fields of science
Search
Sign In
Create Free Account
Crypto++
Known as:
Crypto
Crypto++ (also known as CryptoPP, libcrypto++, and libcryptopp) is a free and open source C++ class library of cryptographic algorithms and schemes…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
32-bit
AES instruction set
AIX
Advanced Encryption Standard process
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Matters of Coercion-Resistance in Cryptographic Voting Schemes
Carmen Kempka
2014
Corpus ID: 43826688
Electronic voting has gained more and more interest during the last decades. It promises less error-prone and faster tallying…
Expand
2013
2013
Enhanced truncated differential cryptanalysis of GOST
N. Courtois
,
Theodosis Mourouzis
,
M. Misztal
International Conference on Security and…
2013
Corpus ID: 15047067
GOST is a well-known block cipher implemented in standard libraries such as OpenSSL, it has extremely low implementation cost and…
Expand
2012
2012
Portability Evaluation of Cryptographic Libraries on Android Smartphones
A. Braga
,
Erick N. Nascimento
International Conference on Cryptography and…
2012
Corpus ID: 8711016
This paper shows the results of an investigation of cryptographic services for mobile devices running Android. The objective of…
Expand
2012
2012
On the Security of Black-Box Implementation of Visual Secret Sharing Schemes
Adrian Atanasiu
,
Ruxandra F. Olimid
,
E. Simion
2012
Corpus ID: 62408984
Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However…
Expand
2010
2010
Cryptographic Analysis of the Two Structured Multi-signature Schemes
Jun Zhang
2010
Corpus ID: 124136359
Burmester’s scheme and Lin’s scheme are two kinds of structured multi-signature schemes. They provided co-signers with different…
Expand
2009
2009
Linguistic Cryptographic Threshold Schemes
M. Ogiela
,
Urszula Ogiela
2009
Corpus ID: 17345994
In this paper a new way of secret sharing algorithms expansion based on additional, linguistic stage, introduced for the…
Expand
2009
2009
DNA Cryptographic Algorithms
O. Tornea
,
M. Borda
2009
Corpus ID: 60791184
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A—T, C—G) offer the possibility to…
Expand
Review
2004
Review
2004
CRYPTOGRAPHIC ALGORITHMS FOR UMTS
K. Nyberg
2004
Corpus ID: 8935606
The cryptographic algorithms of GSM have received a lot of interest and activity from the cryptographic research community and…
Expand
2004
2004
Towards fault-tolerant cryptographic computations over finite fields
A. Reyhani-Masoleh
,
M. A. Hasan
TECS
2004
Corpus ID: 13090883
Cryptographic schemes, such as authentication, confidentiality, and integrity, rely on computations in very large finite fields…
Expand
Review
2003
Review
2003
Compromising emissions from a high speed cryptographic embedded system
D. O'Rourke
2003
Corpus ID: 107873183
Specific hardware implementations of cryptographic algorithms have been subject to a number of “side channel” attacks of late. A…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required