aadomn / gift
Software optimized implementations of GIFT and GIFT-COFB
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for gift
- ☆32Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆18Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆33Updated last year
- CryptoBib Database for Developers☆40Updated 2 weeks ago
- An open source project for study S-boxes☆38Updated 2 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 2 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆27Updated 3 months ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆37Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆13Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated 4 months ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- An implementation of the LowMC block cipher family.☆24Updated 6 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆48Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆61Updated 3 weeks ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago