/
Algorithms
Algorithms
Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:
Tree & Graph algorithms
ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees
Parsers
Recursion
Searching & Sorting
Randomness
Flow Networks
Sequences
MEX (minimal excluded) of a sequence
Software Architecture
Distributed Ledger (DLT)
Cryptography & Encryption
Asymmetric (public key) encryption
SHA-3 (SHA-3 512)
Cryptographically secure pseudo-random number generators
Advanced Encryption Standard (AES), also known as Rijndael
Machine Learning
Gaussian Process Classification (GPC)
Blockchain
Decision Tree
Classification Metrics
Area under the ROC curve (AUC-ROC)
Error Correction
Auto-Bug-Repair
Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.
COPYRIGHT (C) 2015-2025 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.