This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do differential and linear cryptanalysis on it. It is also suitable to find impossible input and output, which helps you in impossible differential attack, and zero-correlation attack. The MILP models are based on …
☆17Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for MILP-tool-for-cryptanalysis-of-block-ciphers
Users that are interested in MILP-tool-for-cryptanalysis-of-block-ciphers are comparing it to the libraries listed below
Sorting:
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- ☆11May 21, 2020Updated 5 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated last month
- An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks☆12Nov 12, 2024Updated last year
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated 2 months ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆31Feb 25, 2026Updated 3 weeks ago
- 基于Android系统的文件加解密☆16Jan 3, 2017Updated 9 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Jun 24, 2020Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Hardware designs for fault detection☆20Apr 13, 2020Updated 5 years ago
- Encoding different problems into Boolean satisfiability☆12Sep 29, 2022Updated 3 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆39Dec 8, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago