FloydZ / decoding
Implementation of the fastest ISD algorithms
☆22Updated 2 months ago
Alternatives and similar repositories for decoding
Users that are interested in decoding are comparing it to the libraries listed below
Sorting:
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆44Updated last week
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13Updated last year
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆18Updated 2 weeks ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆14Updated last year
- Implicit White-box Implementations of ARX Ciphers☆14Updated 2 years ago
- A Sage interface for FGb (Gröbner basis computations)☆34Updated last year
- Implementation of some information-set decoding algorithms☆9Updated 3 years ago
- ☆39Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆10Updated this week
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆44Updated last year
- ☆31Updated last year
- The General Sieve Kernel☆117Updated this week
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆35Updated 5 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆129Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆63Updated last week
- ☆32Updated last year
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 5 years ago
- ☆12Updated 5 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆32Updated last month
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 6 years ago
- ☆48Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆82Updated 3 years ago
- Calculate the AES-128 key schedule given any round key☆30Updated last year
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆17Updated 4 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆10Updated last month
- Representing DES in Z3☆15Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 3 months ago
- ☆20Updated this week