encrypted-def / DES-12Round-Differential-Attack
based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.
☆9Updated 2 years ago
Alternatives and similar repositories for DES-12Round-Differential-Attack:
Users that are interested in DES-12Round-Differential-Attack are comparing it to the libraries listed below
- 공학수학 강의노트☆18Updated last year
- 2019 딥러닝-비전처리 홀로서기 특강에 사용된 Lecture Note 및 Code Repository입니다.☆12Updated 5 years ago
- My ctf challenges, mostly cryptography☆13Updated last year
- ☆8Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- Tools for studying S-boxes☆33Updated this week
- 🧩 Collection of CTF challenges written by me☆19Updated last year
- ☆11Updated 4 years ago
- Implementation of some information-set decoding algorithms☆9Updated 3 years ago
- CVP "trick" for CTF challenges☆130Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆29Updated 6 months ago
- Go implementation of (MK)TFHE scheme☆24Updated this week
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 5 years ago
- rkm0959 implements stuff☆43Updated 2 years ago
- A set of exercises for getting started with the Tamarin prover☆18Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆52Updated 2 weeks ago
- Solving BDD and uSVP with predicate☆46Updated 7 months ago
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆69Updated 5 years ago
- ☆34Updated 2 years ago
- 소프트웨어 엄밀 검증☆9Updated 8 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆127Updated last year
- A repository trying to collect things related to LLL☆71Updated 5 months ago
- Statistically Acceptable GAussian☆11Updated last year
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 6 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- LLL, MLL, BKZ, etc.