WardBeullens / BreakingRainbowLinks
Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper
☆83Updated 3 years ago
Alternatives and similar repositories for BreakingRainbow
Users that are interested in BreakingRainbow are comparing it to the libraries listed below
Sorting:
- Tool for generating Elliptic curve domain parameters☆128Updated 5 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated last year
- The General Sieve Kernel☆124Updated 2 months ago
- Basis Reduction Algorithms for Codes (LLL and more)☆27Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆67Updated this week
- ☆43Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆53Updated last week
- ☆17Updated last month
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆97Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆50Updated 2 years ago
- ☆20Updated 6 years ago
- Fast constant-time AES implementations on 32-bit architectures☆66Updated 11 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- CryptoBib Database for Developers☆45Updated 2 weeks ago
- ☆40Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆52Updated 3 months ago
- MAYO C implementation☆19Updated 6 months ago
- CryptoBib BibTex files☆61Updated 2 weeks ago
- ☆12Updated 4 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 4 months ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆36Updated 10 months ago
- Lattices in Cryptography (University of Michigan)☆100Updated last year
- ☆23Updated 3 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- Experimental implementation of KEMTLS in Rustls☆32Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆101Updated this week
- ☆53Updated last week