Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,490 papers from all fields of science
Search
Sign In
Create Free Account
Cryptol
Cryptol is a domain specific programming language for cryptography developed by the Portland, Oregon based software development firm, Galois, Inc…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Artificial intelligence
Cipher
Cryptography
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Bloom Filter for High Dimensional Vectors
Chunyan Shuai
,
Hengcheng Yang
,
Xin Ouyang
,
Zeweiyi Gong
Inf.
2018
Corpus ID: 52878077
Regardless of the type of data, traditional Bloom filters treat each element of a set as a string, and by iterating every…
Expand
2010
2010
Cryptol, a DSL for cryptographic algorithms
Sally Browning
CUFP '10
2010
Corpus ID: 12985942
Cryptol is a domain-specific functional language designed by Galois, Inc in collaboration with the the NSA for specifying…
Expand
2010
2010
Designing Tunable, Verifiable Cryptographic Hardware Using Cryptol
Sally Browning
,
P. Weaver
Design and Verification of Microprocessor Systems…
2010
Corpus ID: 59716933
Cryptographic functional units are increasingly being incorporated into microprocessor designs. In this chapter, we demonstrate…
Expand
Review
2009
Review
2009
Hardware/software co-verification of cryptographic algorithms using Cryptol
Levent Erkök
,
M. Carlsson
,
Adam Wick
Formal Methods in Computer-Aided Design
2009
Corpus ID: 23306298
Cryptol is a programming language designed for specifying cryptographic algorithms. Despite its high-level modeling nature…
Expand
2009
2009
High assurance programming in Cryptol
Levent Erkök
,
John Matthews
Cyber Security and Information Intelligence…
2009
Corpus ID: 7700473
Cryptol is a domain specific language tailored for cryptographic algorithms (www.cryptol.net). Explicit support for program…
Expand
2008
2008
An Analysis of the Vector Decomposition Problem
S. Galbraith
,
E. Verheul
International Conference on Theory and Practice…
2008
Corpus ID: 714288
The vector decomposition problem (VDP) has been proposed as a computational problem on which to base the security of public key…
Expand
2008
2008
Fast correlation attack on stream cipher ABC v3
Haina Zhang
,
Lin Li
,
Xiaoyun Wang
Science in China Series F: Information Sciences
2008
Corpus ID: 14786922
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is…
Expand
2005
2005
Fault Attack
Olivier Benoît
Encyclopedia of Cryptography and Security
2005
Corpus ID: 11969004
1997
1997
Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes
Liam Keliher
1997
Corpus ID: 15895393
Substitution-permutation networks (SPNs) are an important class of private key cryptosystems, having substitution boxes (s-boxes…
Expand
Review
1974
Review
1974
Introduction into California of Cold-tolerant Biotypes of the Mealybug Predator Cryptolaemus montrouzieri , and Laboratory Procedures for Testing Natural Enemies for Cold-hardiness
B. Bartlett
1974
Corpus ID: 85091718
A review is presented of the initial importation of the Australian mealybug lady beetle, Cryptolaemus montrouzieri Mulsant, in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE