encrypted-def / DES-12Round-Differential-AttackLinks
based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.
☆10Updated 2 years ago
Alternatives and similar repositories for DES-12Round-Differential-Attack
Users that are interested in DES-12Round-Differential-Attack are comparing it to the libraries listed below
Sorting:
- 공학수학 강의노트☆18Updated last year
- 2019 딥러닝-비전처리 홀로서기 특강에 사용된 Lecture Note 및 Code Repository입니다.☆12Updated 5 years ago
- My ctf challenges, mostly cryptography☆14Updated last week
- 소프트웨어 엄밀 검증☆9Updated last year
- Presentations by rkm0959☆26Updated last year
- MAT2120 Number Theory☆9Updated 5 years ago
- Zero Knowledge based Ethereum Virtual Machine in Circom language☆17Updated last month
- ☆28Updated 6 months ago
- 🧩 Collection of CTF challenges written by me☆19Updated 3 months ago
- 2025년 국민대학교 KPSC + AIM 스터디 - 강화학습을 이용한 체스 AI 만들기☆12Updated last month
- Go implementation of (MK)TFHE scheme☆33Updated 2 weeks ago
- ☆12Updated last month
- CVP "trick" for CTF challenges☆136Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆66Updated this week
- rkm0959 implements stuff☆45Updated 2 years ago
- lattice-based zkSNARKs over libsnark [ISW21]☆32Updated 9 months ago
- O(n log n) algorithm finding solutions of Erdős-Ginzburg-Ziv theorem.☆14Updated 2 years ago
- ☆19Updated 6 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆47Updated 3 weeks ago
- LLL, MLL, BKZ, etc.☆10Updated 4 years ago
- The ultimate BFT blockchain engine for decentralized organizations with powerful trustless interoperability.☆72Updated last year
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 5 years ago
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆82Updated 2 years ago
- ☆16Updated 11 months ago
- Some writeups for some CTFs☆17Updated last year
- Cryptography & CTF Writeups☆83Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆133Updated 2 years ago
- A Fully Homomorphic Encryption (FHE) library for bridging the gap between theory and practice with a focus on performance and accuracy.☆127Updated 3 months ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆242Updated 2 years ago
- 🎲 Woodoku-based reinforcement learning environment using Gymnasium☆10Updated 9 months ago