cr-marcstevens / dblpbibtex
DBLP BibTeX - bibtex wrapper for automatic DBLP & IACR ePrint downloads
☆17Updated 2 years ago
Alternatives and similar repositories for dblpbibtex
Users that are interested in dblpbibtex are comparing it to the libraries listed below
Sorting:
- Analysis and generation of substitutions☆23Updated 3 years ago
- M4GB: Efficient Groebner Basis algorithm☆55Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆14Updated 2 years ago
- Frobenius Additive Fourier Transform☆13Updated 3 months ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- ☆13Updated 3 years ago
- Generic server for collaborative code analysis☆13Updated 8 years ago
- A minimalistic and high-performance SAT solver☆28Updated 2 years ago
- Sort-of GNU C99 Declaration Parser☆11Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Implementation of cryptographic program obfuscation☆41Updated 7 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- ☆11Updated 4 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 2 weeks ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 8 months ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 4 years ago
- CryptoBib Database for Developers☆44Updated last week
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Source for https://www.sagemath.org/library-publications.html; submit Issues/PRs here to add/update citations of documents citing Sage☆25Updated 5 months ago
- Automatic problem solver based on circuit-like representation and genetic programming☆14Updated 7 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆13Updated last month
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated 9 months ago
- ☆12Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆10Updated 3 weeks ago
- VTable Hijacking Protection for Binaries☆12Updated 8 years ago
- Python code and tests for the post 'Programming with Finite Fields'☆48Updated 4 years ago
- Exact 64-bit convolution algorithm☆15Updated 8 years ago