asuhl-ucsd / shellLLLinks
The world's first (and hopefully last) pure-bash implementation of the LLL algorithm
☆19Updated 2 years ago
Alternatives and similar repositories for shellLL
Users that are interested in shellLL are comparing it to the libraries listed below
Sorting:
- ☆44Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated 2 years ago
- The General Sieve Kernel☆141Updated 3 months ago
- Tool for generating Elliptic curve domain parameters☆131Updated 2 months ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆56Updated last month
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Updated 10 months ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 4 years ago
- Fast lattice reduction☆228Updated 5 months ago
- Crypto library☆67Updated 2 months ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Updated 4 years ago
- Official SQIsign code, version under continuous development☆52Updated 7 months ago
- Language for high-assurance and high-speed cryptography☆328Updated this week
- ☆37Updated 2 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆54Updated 2 years ago
- ☆20Updated last year
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆47Updated 3 months ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆73Updated last week
- EasyCrypt: Computer-Aided Cryptographic Proofs☆382Updated this week
- The formally verified crypto library for Rust☆201Updated this week
- MAYO C implementation☆22Updated 10 months ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Updated 9 years ago
- ☆42Updated 3 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Updated 2 months ago
- ☆35Updated 2 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆190Updated 2 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆39Updated last week