J08nY / ecgen
Tool for generating Elliptic curve domain parameters
☆116Updated this week
Alternatives and similar repositories for ecgen:
Users that are interested in ecgen are comparing it to the libraries listed below
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆127Updated last year
- ☆36Updated 2 years ago
- ☆34Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- The General Sieve Kernel☆107Updated 3 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year
- Solving BDD and uSVP with predicate☆47Updated 7 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 7 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- Standard curve database.☆108Updated 7 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆41Updated last week
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆62Updated this week
- ☆30Updated last year
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 6 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆67Updated this week
- ☆66Updated 4 years ago
- A bitsliced implementation of ECB and CTR AES☆49Updated 7 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆25Updated 4 months ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago
- Differential Address Trace Analysis☆55Updated last year