delta003 / lenstra_algorithmLinks
Lenstra's factorization algorithm in Python
☆16Updated 7 years ago
Alternatives and similar repositories for lenstra_algorithm
Users that are interested in lenstra_algorithm are comparing it to the libraries listed below
Sorting:
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Implementation of ECM (Lenstra elliptic curve factorization). Small part of my Master Thesis, which I would like to share.☆12Updated 2 years ago
- ☆19Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- Elliptic curves Rust reference implementation☆16Updated last year
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆27Updated last year
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- A Python3 Implementation of LLL☆36Updated 4 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.☆21Updated 3 years ago
- Interactive proof-of-concept of the Dual_EC_DRBG backdoor☆15Updated 2 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- Python Cryptograpy☆18Updated 3 years ago
- Online engine for reasoning about the Noise Protocol Framework.☆13Updated 7 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 3 months ago
- ☆28Updated 3 years ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- Optimizations for Pairing-Based Cryptography☆16Updated 3 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year