J08nY / ecgen
Tool for generating Elliptic curve domain parameters
☆113Updated 2 months ago
Alternatives and similar repositories for ecgen:
Users that are interested in ecgen are comparing it to the libraries listed below
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated 2 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- The General Sieve Kernel☆105Updated 2 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆67Updated 3 weeks ago
- ☆34Updated last year
- Standard curve database.☆106Updated 5 months ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 6 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 6 months ago
- ☆34Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆25Updated 2 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Solving BDD and uSVP with predicate☆45Updated 6 months ago
- ☆66Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Security Estimation Scripts for Kyber and Dilithium☆32Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- Differential Address Trace Analysis☆54Updated 10 months ago
- ☆22Updated 2 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- ☆16Updated 3 years ago