Statistically Acceptable GAussian
☆14Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for SAGA
Users that are interested in SAGA are comparing it to the libraries listed below
Sorting:
- MIRROR: Discrete Gaussians over the Integers☆20Jun 29, 2018Updated 7 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- [CourseProject] 密码学:C语言实现DES和AES算法;Python实现RSA加密。Cryptography: DES and AES algorithms implemented with C; RSA implemented with Python.☆11Aug 25, 2023Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- Implementation of ChaCha20 for Cyclone V FPGA (DE10-nano) easily connectable to HPS (ARM processor)☆11Jul 29, 2020Updated 5 years ago
- A balatro mod using steamodded revolving around a celeste card theme☆16Aug 17, 2025Updated 6 months ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆14May 17, 2022Updated 3 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- ☆11Mar 2, 2024Updated 2 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- Cairo implementation of operations over the elliptic curve BLS12-381☆14Feb 8, 2023Updated 3 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- [ICCV 2025] Official repository of the paper "BlinkTrack: Feature Tracking over 80 FPS via Events and Images". This repository contains t…☆11Aug 27, 2025Updated 6 months ago
- JavaWeb实现的优优图书商城☆10Aug 8, 2014Updated 11 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- This project allows you to have a set of aliases defined per directory and subdirectories☆11Aug 15, 2021Updated 4 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- ☆16May 12, 2025Updated 9 months ago
- Fast algorithm for sampling from discrete distributions☆13Dec 6, 2024Updated last year
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- LLL, MLL, BKZ, etc.☆10Dec 22, 2020Updated 5 years ago
- ☆10Aug 27, 2020Updated 5 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- 人事管理系统使用了SSM控件,使用Maven进行依赖包控制。☆13Dec 16, 2022Updated 3 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- ☆12Mar 1, 2023Updated 3 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- PYNQ for Zybo board☆12Jan 30, 2026Updated last month
- Interactive proof-of-concept of the Dual_EC_DRBG backdoor☆20Sep 8, 2022Updated 3 years ago
- Watch for new txs in a cosmos node mempool☆10Oct 16, 2023Updated 2 years ago
- Django storage for qcloud's COS☆13May 19, 2020Updated 5 years ago
- Some of Our Audit Reports, Presentations, etc☆13Mar 26, 2024Updated last year
- ☆12Jul 18, 2022Updated 3 years ago
- ☆12Dec 22, 2024Updated last year
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- ☆15May 27, 2021Updated 4 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆18Sep 3, 2021Updated 4 years ago