An implementation of the LowMC block cipher family.
☆27Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for lowmc
Users that are interested in lowmc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- ☆10Apr 10, 2020Updated 6 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆28Jul 13, 2017Updated 8 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- The instance generator of the Vision and Rescue block ciphers.☆18Mar 4, 2022Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆33Apr 13, 2026Updated last month
- ☆52May 12, 2023Updated 3 years ago
- The Simplest Oblivious Transfer Protocol by Chou and Orlandi. http://users-cs.au.dk/orlandi/simpleOT/☆12Aug 8, 2019Updated 6 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- ☆16Jun 24, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆16Nov 19, 2020Updated 5 years ago
- A compiler to turn GO code into a zkSNARK☆16Jul 19, 2021Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- A solver for the (unicost) set covering problem☆24Apr 18, 2026Updated last month
- An efficient circuit implementation of SHA256.☆12Jan 14, 2018Updated 8 years ago
- ☆13Sep 9, 2019Updated 6 years ago
- ☆46Nov 27, 2024Updated last year
- Multi-party Private Set Union☆17Feb 1, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆62Sep 4, 2023Updated 2 years ago
- ☆10Mar 24, 2020Updated 6 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆32May 7, 2023Updated 3 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Provides a way to monitor cryptographic operations performed on a system☆19May 14, 2026Updated last week
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- HEAAN lib binds for Python☆32Aug 27, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Extension to Tink Go that provides Google Cloud KMS integration☆16Apr 24, 2026Updated 3 weeks ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- Frobenius Additive Fourier Transform☆13Jan 22, 2025Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆78Updated this week
- 一个关于待办事项提醒的项目☆14Apr 13, 2017Updated 9 years ago
- Optimized implementation of the Picnic signature scheme☆84Sep 2, 2022Updated 3 years ago
- ☆26Feb 20, 2025Updated last year