# Algorithms

Security Reviewerâ€™s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:

## Tree & Graph algorithms

ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees

## Parsers

## Recursion

## Searching & Sorting

## Randomness

## Flow Networks

## Sequences

Damerauâ€“Levenshtein distance

MEX (minimal excluded) of a sequence

## Software Architecture

Distributed Ledger (DLT)

## Cryptography & Encryption

Asymmetric (public key) encryption

SHA-3 (SHA-3 512)

Cryptographically secure pseudo-random number generators

Elliptic-curve Diffieâ€“Hellman

Advanced Encryption Standard (AES), also known as Rijndael

## Machine Learning

Gaussian Process Classification (GPC)

## Blockchain

## Decision Tree

## Classification Metrics

Area under the ROC curve (AUC-ROC)

## Error Correction

## Auto-Bug-Repair

Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.

COPYRIGHT (C) 2015-2024 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.