SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA
☆24Jul 12, 2013Updated 12 years ago
Alternatives and similar repositories for NSA-ciphers
Users that are interested in NSA-ciphers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Implementation of Trivium Stream Cipher in Python☆17Jan 23, 2018Updated 8 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- A python implementation of the block cipher RC4☆41Dec 7, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IPython-style interaction for Cryptol☆15Dec 5, 2016Updated 9 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- Ethereum in Rust☆14Sep 18, 2023Updated 2 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Fortify SCA Plugin for SonarQube☆14Jun 7, 2021Updated 4 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Implementations of the Simon and Speck Block Ciphers☆103Jul 21, 2018Updated 7 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- ☆19Jan 25, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆32May 7, 2023Updated 2 years ago
- A technique for developing Fortify structural rules and characterization rules.☆14Dec 2, 2019Updated 6 years ago
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆13Jun 24, 2021Updated 4 years ago
- The realization of paper 'HD-CNN: Hierarchical Deep Convolutional Neural Networks for Large Scale Visual Recognition'☆10Dec 18, 2025Updated 4 months ago
- ☆12Jul 13, 2018Updated 7 years ago
- Bring fast TEA cipher to Python. Powered by Rust.☆17Oct 8, 2025Updated 6 months ago
- A solver for the (unicost) set covering problem☆23Dec 21, 2025Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- A pure Python skiplist implementation. For fun.☆24Dec 3, 2013Updated 12 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆38Jan 13, 2026Updated 3 months ago
- ☆11May 21, 2020Updated 5 years ago
- Implementation of Strumok stream cipher☆19Aug 20, 2022Updated 3 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆18Nov 1, 2023Updated 2 years ago
- 本科毕业设计:基于DES加密的即时通信聊天系统☆15Sep 19, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code for creating, using, and cloning MT19937 Mersenne Twister PRNGs☆17Dec 5, 2020Updated 5 years ago
- ☆17Jul 31, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 10 years ago
- CVC4 is an efficient open-source automatic theorem prover for satisfiability modulo theories (SMT) problems.☆22May 6, 2021Updated 4 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago