J08nY / ecgen
Tool for generating Elliptic curve domain parameters
☆109Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for ecgen
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated this week
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- Standard curve database.☆104Updated 2 months ago
- ☆31Updated last year
- ☆35Updated 2 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆88Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- The General Sieve Kernel☆104Updated last week
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆24Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆41Updated last year
- Differential Address Trace Analysis☆54Updated 7 months ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆62Updated 3 months ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- ☆66Updated 4 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆34Updated this week
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- Complex multiplication based factorization☆35Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- Automated cryptanalysis of substitution permutation network cipher☆27Updated 2 months ago
- ☆14Updated 4 years ago
- ☆39Updated 5 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- White-box Analysis and Implementation Tools☆73Updated 2 years ago