WvanWoerden / G6K-GPU-Tensor
Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)
☆27Updated 2 years ago
Alternatives and similar repositories for G6K-GPU-Tensor:
Users that are interested in G6K-GPU-Tensor are comparing it to the libraries listed below
- The General Sieve Kernel☆106Updated 2 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- A library for lattice-based homomorphic encryption in Go☆13Updated 2 years ago
- ☆34Updated 2 years ago
- Solving BDD and uSVP with predicate☆45Updated 7 months ago
- ☆29Updated last year
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆34Updated 9 months ago
- A Python interface for https://github.com/fplll/fplll☆129Updated last month
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- ☆32Updated last year
- ☆30Updated last year
- ☆18Updated 6 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 6 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆39Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Lattices in Cryptography (University of Michigan)☆78Updated 5 months ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- ☆14Updated last week
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- Fast lattice reduction☆187Updated last month
- Tools for studying S-boxes☆33Updated last week
- This is repository for python implementation of TFHE. We are plannning to use numpy and CuPy to support GPU accelaration.☆17Updated 4 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆30Updated last year
- An Implementation of the Number Theoretic Transform☆42Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆29Updated 3 months ago
- ☆14Updated 3 years ago
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆13Updated last year
- GPU/CUDA implementation of Leveled BFV/CKKS/BGV scheme.☆27Updated this week