Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper
☆84Apr 13, 2022Updated 3 years ago
Alternatives and similar repositories for BreakingRainbow
Users that are interested in BreakingRainbow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- ☆24Jul 7, 2022Updated 3 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆19Nov 22, 2025Updated 4 months ago
- ☆42May 29, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆195Oct 11, 2023Updated 2 years ago
- ☆67Nov 10, 2025Updated 4 months ago
- ☆26Feb 20, 2025Updated last year
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Nov 25, 2024Updated last year
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆134Jun 18, 2025Updated 9 months ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Jan 13, 2024Updated 2 years ago
- Fast lattice reduction☆233Aug 25, 2025Updated 6 months ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Implementation of the fastest ISD algorithms☆23Feb 21, 2025Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Curve ecGFp5☆69Mar 31, 2022Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆24Mar 4, 2025Updated last year
- Implementation of RC4 and its FMS Attack☆19May 18, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆48Updated this week
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 3 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago