LowMC / lowmc
An implementation of the LowMC block cipher family.
☆25Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for lowmc
- CryptoBib BibTex files☆52Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- ☆50Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- SageMath library for constructing elliptic curves☆65Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆38Updated last year
- ☆18Updated 5 years ago
- An open source project for study S-boxes☆38Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- CryptoBib Main Repository for Developers☆18Updated 3 months ago
- Experiments with Universal Composability in EasyCrypt☆32Updated this week
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆14Updated 4 years ago
- Hashing to Elliptic Curves☆79Updated 2 months ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 4 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 8 years ago
- ☆39Updated 7 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆35Updated last month
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆13Updated 4 years ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated 2 weeks ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated this week
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆25Updated 5 months ago
- Functional encryption library in C☆79Updated 3 years ago
- The General Sieve Kernel☆104Updated last week
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 7 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago