LaurenDM / AttackAESCTRView external linksLinks
☆20Dec 13, 2019Updated 6 years ago
Alternatives and similar repositories for AttackAESCTR
Users that are interested in AttackAESCTR are comparing it to the libraries listed below
Sorting:
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated last year
- ☆12Oct 7, 2019Updated 6 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- M4GB: Efficient Groebner Basis algorithm☆71Nov 27, 2018Updated 7 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 4 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- ☆31Jan 13, 2021Updated 5 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- ☆13Mar 3, 2021Updated 4 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Sep 5, 2024Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 6 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Flexibly construct and implement attacks on Learning Parity with Noise☆11Sep 26, 2023Updated 2 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- 🎨 A tool program to set terminal colors from image☆10May 3, 2017Updated 8 years ago
- Hardware designs for fault detection☆19Apr 13, 2020Updated 5 years ago