This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do differential and linear cryptanalysis on it. It is also suitable to find impossible input and output, which helps you in impossible differential attack, and zero-correlation attack. The MILP models are based on …
☆17Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for MILP-tool-for-cryptanalysis-of-block-ciphers
Users that are interested in MILP-tool-for-cryptanalysis-of-block-ciphers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- ☆11May 21, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Nov 29, 2018Updated 7 years ago
- Open Cryptanalysis Platform☆14Apr 2, 2026Updated last week
- An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks☆12Nov 12, 2024Updated last year
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- The GIFT Block Cipher☆13Nov 11, 2025Updated 4 months ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 6 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆38Jan 13, 2026Updated 2 months ago
- 基于Android系统的文件加解密☆16Jan 3, 2017Updated 9 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆31Feb 25, 2026Updated last month
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Jun 24, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Hardware designs for fault detection☆21Apr 13, 2020Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆32May 7, 2023Updated 2 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Sep 27, 2015Updated 10 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆39Dec 8, 2022Updated 3 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 7 years ago
- Balloon Hashing implemented in Python☆17Nov 21, 2025Updated 4 months ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago