☆13Sep 9, 2019Updated 6 years ago
Alternatives and similar repositories for LPN-decoded
Users that are interested in LPN-decoded are comparing it to the libraries listed below
Sorting:
- Flexibly construct and implement attacks on Learning Parity with Noise☆11Sep 26, 2023Updated 2 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- A solver for the (unicost) set covering problem☆23Dec 21, 2025Updated 2 months ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- ☆11Oct 24, 2024Updated last year
- Algorithm to detect bursts in the EEG of preterm infants (Python version of an existing Matlab program)☆11Feb 17, 2020Updated 6 years ago
- ☆13Oct 1, 2025Updated 5 months ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Sep 8, 2023Updated 2 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- ☆10Jan 25, 2016Updated 10 years ago
- Blockstream Satellite Receiver GNU Radio Out-of-tree Module☆11Jul 8, 2019Updated 6 years ago
- wireless channel simulation☆50May 6, 2019Updated 6 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Sep 18, 2020Updated 5 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- Spectrum analysis and digital downconversion of high sample rates☆12Apr 24, 2023Updated 2 years ago
- A Simulator for Communication Systems☆13Jul 22, 2024Updated last year
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- Compressed Sensing and Kalman Filter Based Channel Tracking for mmWave Massive MIMO Systems☆15Apr 24, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Reverse-Engineering of the NABU PC's Network Adapter, one of the first cable data modems.☆12Mar 28, 2024Updated last year
- Tools for searching the radio of signal☆10May 2, 2023Updated 2 years ago
- A step-by-step implementation of a ResNet-18 model for image classification on the CIFAR-10 dataset☆10Dec 5, 2024Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- AOA estimation algorithm(CB MUSIC MVDR SAMV) for linear array☆11Apr 2, 2019Updated 6 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆56Jan 6, 2026Updated last month
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- Implementation of Trivium Stream Cipher in Python☆17Jan 23, 2018Updated 8 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Matlab Toolbox for DOA estimation☆12Jul 19, 2013Updated 12 years ago