A tool to estimate the difficulty of solving the syndrome decoding problem.
☆19May 29, 2023Updated 2 years ago
Alternatives and similar repositories for syndrome_decoding_estimator
Users that are interested in syndrome_decoding_estimator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆57Jan 6, 2026Updated 2 months ago
- Implementation of the fastest ISD algorithms☆23Feb 21, 2025Updated last year
- A collection of Bristol format circuit files☆13Nov 15, 2022Updated 3 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Mar 14, 2026Updated last week
- my ctf chals☆11Jul 7, 2025Updated 8 months ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆48Updated this week
- Collection of MPC Protocols, mostly using libscapi☆13Nov 3, 2019Updated 6 years ago
- Berlekamp-Massey algorithm☆12Jul 11, 2012Updated 13 years ago
- ☆11Jul 14, 2025Updated 8 months ago
- ☆16May 17, 2024Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- ☆15Mar 14, 2023Updated 3 years ago
- Protocols for Secure Genomic Computation☆12Aug 28, 2017Updated 8 years ago
- Game in Haskell☆14Mar 14, 2026Updated last week
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated last year
- Realizing private and practical pharmacological collaboration☆15Oct 19, 2018Updated 7 years ago
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- ☆10Jul 16, 2025Updated 8 months ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- ☆46Feb 28, 2023Updated 3 years ago
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated last year
- ☆13Mar 23, 2018Updated 8 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- M4GB: Efficient Groebner Basis algorithm☆71Nov 27, 2018Updated 7 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- Implementation of zero knowledge proof protocol - Groth16, Plonk. For education purposes. Not a production ready code.☆80Dec 23, 2023Updated 2 years ago
- An attempt at a new LWE estimator☆346Feb 23, 2026Updated last month
- Simulate a low-bandwidth, high-latency network connection☆27Feb 16, 2022Updated 4 years ago
- ☆22May 14, 2024Updated last year
- A library for lattice-based homomorphic encryption in Go☆14May 15, 2022Updated 3 years ago
- Fast program tracing and analysis☆17Feb 3, 2026Updated last month
- Zero-Knowledge Proof Toolbox☆35Jan 15, 2022Updated 4 years ago
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 7 months ago