An implementation of the LowMC block cipher family.
☆27Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for lowmc
Users that are interested in lowmc are comparing it to the libraries listed below
Sorting:
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- The instance generator of the Vision and Rescue block ciphers.☆17Mar 4, 2022Updated 4 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆31Feb 25, 2026Updated 3 weeks ago
- ☆52May 12, 2023Updated 2 years ago
- Bosphorus, ANF simplifier and solver, and ANF-to-CNF converter☆78Apr 6, 2025Updated 11 months ago
- The Simplest Oblivious Transfer Protocol by Chou and Orlandi. http://users-cs.au.dk/orlandi/simpleOT/☆12Aug 8, 2019Updated 6 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- ☆16Jun 24, 2024Updated last year
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- A compiler to turn GO code into a zkSNARK☆16Jul 19, 2021Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- An efficient circuit implementation of SHA256.☆12Jan 14, 2018Updated 8 years ago
- ☆45Nov 27, 2024Updated last year
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- ☆10Mar 24, 2020Updated 5 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Provides a way to monitor cryptographic operations performed on a system☆19Updated this week
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- Frobenius Additive Fourier Transform☆13Jan 22, 2025Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆77Mar 15, 2026Updated last week
- An OpenSSL Engine that interfaces with the TrouSerS tpm 1.2 stack (fork of official upstream on SourceForge, featuring OpenSSL 1.1 suppor…☆10Dec 30, 2024Updated last year
- 一个关于待办事项提醒的项目☆14Apr 13, 2017Updated 8 years ago
- Optimized implementation of the Picnic signature scheme☆83Sep 2, 2022Updated 3 years ago
- ☆26Feb 20, 2025Updated last year
- Fawkes-Crypto - zkSNARKs framework☆21Feb 6, 2024Updated 2 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆104Sep 8, 2023Updated 2 years ago
- 🪩 verify plonky3 proofs in plonky2☆19Mar 28, 2024Updated last year
- ☆17Nov 20, 2017Updated 8 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Apr 16, 2018Updated 7 years ago