delta003 / lenstra_algorithmLinks
Lenstra's factorization algorithm in Python
☆16Updated 7 years ago
Alternatives and similar repositories for lenstra_algorithm
Users that are interested in lenstra_algorithm are comparing it to the libraries listed below
Sorting:
- Implementation of ECM (Lenstra elliptic curve factorization). Small part of my Master Thesis, which I would like to share.☆12Updated 2 years ago
- ☆19Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A Python3 Implementation of LLL☆36Updated 4 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- A DSL for Software-Defined Satellite Applications☆24Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- Using clang and llvm to compile C into Web Assembly☆27Updated 5 years ago
- Interactive proof-of-concept of the Dual_EC_DRBG backdoor☆15Updated 2 years ago
- NIST P-256 signatures for Cortex-M4 microcontrollers☆14Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- ☆28Updated 3 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆27Updated last year
- A tweakable block cipher☆31Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- ☆10Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- General number field sieve for python☆18Updated 9 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆119Updated 4 years ago
- ☆40Updated last year
- A straight-line implementation of the Skipjack cipher in Rust☆10Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- const fn implementation of the SHA-2 family of hash functions☆16Updated last year
- Divide-and-Conquer Parallel Pattern Implementation in FastFlow☆10Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago