WardBeullens / BreakingRainbow
Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper
☆79Updated 2 years ago
Alternatives and similar repositories for BreakingRainbow:
Users that are interested in BreakingRainbow are comparing it to the libraries listed below
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- ☆34Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- ☆19Updated 6 years ago
- Official SQIsign code, version under continuous development☆20Updated this week
- ☆22Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 6 months ago
- Tool for generating Elliptic curve domain parameters☆113Updated 2 months ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 11 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- The General Sieve Kernel☆105Updated last month
- CryptoBib Database for Developers☆43Updated last month
- ☆16Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- An implementation of Dumer's algorithm for Information Set Decoding.☆13Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 8 months ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆18Updated last month
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated last month
- Crypto library☆55Updated 2 weeks ago
- ☆39Updated 8 months ago
- High-assurance, high-performance C90 implementation of ML-KEM☆33Updated this week
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆59Updated 7 months ago
- ☆13Updated 3 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- MAYO C implementation☆14Updated 2 weeks ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 5 months ago
- Differential Address Trace Analysis☆54Updated 10 months ago