encrypted-def / DES-12Round-Differential-Attack
based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.
☆10Updated 2 years ago
Alternatives and similar repositories for DES-12Round-Differential-Attack:
Users that are interested in DES-12Round-Differential-Attack are comparing it to the libraries listed below
- 공학수학 강의노트☆18Updated 11 months ago
- 2019 딥러닝-비전처리 홀로서기 특강에 사용된 Lecture Note 및 Code Repository입니다.☆12Updated 5 years ago
- CVP "trick" for CTF challenges☆125Updated last year
- Go implementation of (MK)TFHE scheme☆23Updated this week
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 5 months ago
- My ctf challenges, mostly cryptography☆13Updated last year
- Tools for studying S-boxes☆33Updated last week
- rkm0959 implements stuff☆43Updated 2 years ago
- ☆11Updated 4 years ago
- A repository trying to collect things related to LLL☆70Updated 4 months ago
- Cryptography & CTF Writeups☆82Updated last year
- 소프트웨어 엄밀 검증☆9Updated 6 months ago
- 🧩 Collection of CTF challenges written by me☆19Updated last year
- ☆8Updated 2 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Some writeups for some CTFs☆16Updated 9 months ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆50Updated this week
- Statistically Acceptable GAussian☆11Updated last year
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 4 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆67Updated 5 years ago
- ☆66Updated 4 years ago
- LLL, MLL, BKZ, etc.☆10Updated 4 years ago
- MAT2120 Number Theory☆9Updated 5 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆124Updated last year
- ☆30Updated last year
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆38Updated last week
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆23Updated 3 years ago
- Presentations by rkm0959☆26Updated 9 months ago
- A toolkit for cryptanalysis using lattices.☆111Updated last year