Crypto-TII / syndrome_decoding_estimator
A tool to estimate the difficulty of solving the syndrome decoding problem.
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for syndrome_decoding_estimator
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆35Updated this week
- An implementation of Dumer's algorithm for Information Set Decoding.☆12Updated 10 months ago
- ☆31Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 4 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 8 months ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆49Updated this week
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- rkm0959 implements stuff☆43Updated 2 years ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated 3 weeks ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆88Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆27Updated 2 months ago
- The General Sieve Kernel☆104Updated last week
- ☆30Updated last year
- ☆13Updated 9 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆38Updated last year
- CryptoBib BibTex files☆52Updated last month
- An implementation of the LowMC block cipher family.☆25Updated 6 years ago
- Tool for generating Elliptic curve domain parameters☆109Updated 10 months ago
- MPC Simulation Framework☆24Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆25Updated 5 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- ☆25Updated last year
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- CVP "trick" for CTF challenges☆123Updated last year
- Implementation of the fastest ISD algorithms☆18Updated 2 weeks ago
- ☆18Updated 5 years ago
- ☆44Updated 4 months ago
- Examples for EasyCrypt Lectures☆22Updated last month