edwardz246003 / danger-of-using-homomorphic-encryption
This repository give exmaple of attacks on SEAL, to show the danger of using homomorphic encryption
☆3Updated 5 years ago
Related projects: ⓘ
- ☆32Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 6 months ago
- Misuse cases of Cryptography in real world software products☆11Updated 5 years ago
- Attacks on Jarvis and Friday☆10Updated 4 years ago
- ☆31Updated last year
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 4 years ago
- ☆17Updated last year
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- Notes on cryptographic schemes and attacks☆25Updated 5 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆24Updated 4 years ago
- ☆19Updated 4 years ago
- Tool for generating Elliptic curve domain parameters☆106Updated 8 months ago
- ☆17Updated 5 years ago
- ☆14Updated 4 years ago
- Differential Address Trace Analysis☆51Updated 5 months ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated last month
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆10Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 4 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆53Updated 2 weeks ago
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- Falcon signature and its ZKP extensions☆16Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆33Updated this week
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆11Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- CHES 2022 White-box Cryptography Tutorial☆19Updated last year
- ☆12Updated 4 years ago