This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do differential and linear cryptanalysis on it. It is also suitable to find impossible input and output, which helps you in impossible differential attack, and zero-correlation attack. The MILP models are based on …
☆17Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for MILP-tool-for-cryptanalysis-of-block-ciphers
Users that are interested in MILP-tool-for-cryptanalysis-of-block-ciphers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11May 21, 2020Updated 5 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆16Nov 19, 2020Updated 5 years ago
- ☆14Mar 3, 2021Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆28Jul 13, 2017Updated 8 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆41Nov 17, 2024Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated 4 months ago
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 7 months ago
- 基于Android系统的文件加解密☆16Jan 3, 2017Updated 9 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆33Apr 13, 2026Updated last month
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 5 months ago
- ☆10Apr 18, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A repository that aims to provide tools for cryptography and cryptanalysis☆219Jun 24, 2020Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆32May 7, 2023Updated 3 years ago
- ☆10Aug 9, 2016Updated 9 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆40Dec 8, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago