Lcrypto / Kannan_SVP
Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, binary and ternary Learning with error problem)
☆13Updated last year
Related projects: ⓘ
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆21Updated 2 years ago
- The General Sieve Kernel☆102Updated last month
- Implementation of the fastest ISD algorithms☆17Updated last month
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated 2 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆37Updated last year
- A Python interface for https://github.com/fplll/fplll☆119Updated 3 months ago
- Security Estimation Scripts for Kyber and Dilithium☆22Updated 3 years ago
- ☆23Updated last year
- ☆17Updated 5 years ago
- A Sage interface for FGb (Gröbner basis computations)☆30Updated 4 months ago
- A library for lattice-based homomorphic encryption in Go☆11Updated 2 years ago
- ☆31Updated last year
- An Implementation of the Number Theoretic Transform☆33Updated last year
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 4 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆33Updated this week
- Fast lattice reduction☆160Updated last month
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆12Updated 3 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆58Updated last month
- An attempt at a new LWE estimator☆212Updated last week
- ☆13Updated 3 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆151Updated 9 months ago
- Solving BDD and uSVP with predicate☆40Updated last month
- ☆56Updated 10 months ago
- Lattices in Cryptography (University of Michigan)☆62Updated 7 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- CryptoBib Database for Developers☆40Updated last week
- Lecture notes on the Foundations of Isogeny-based Cryptography☆27Updated 2 weeks ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- ☆9Updated 5 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆21Updated 5 years ago