encrypted-def / DES-12Round-Differential-AttackLinks
based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.
☆10Updated 2 years ago
Alternatives and similar repositories for DES-12Round-Differential-Attack
Users that are interested in DES-12Round-Differential-Attack are comparing it to the libraries listed below
Sorting:
- 공학수학 강의노트☆18Updated last year
- My ctf challenges, mostly cryptography☆15Updated 3 months ago
- 2019 딥러닝-비전처리 홀로서기 특강에 사용된 Lecture Note 및 Code Repository입니다.☆12Updated 6 years ago
- Presentations by rkm0959☆26Updated last year
- ☆29Updated 9 months ago
- 🧩 Collection of CTF challenges written by me☆19Updated 6 months ago
- Go implementation of (MK)TFHE scheme☆36Updated last month
- The ultimate BFT blockchain engine for decentralized organizations with powerful trustless interoperability.☆72Updated last year
- rkm0959 implements stuff☆44Updated 3 years ago
- Contents of D3LAB Youtube channel☆30Updated 3 years ago
- Zero Knowledge based Ethereum Virtual Machine in Circom language☆17Updated 4 months ago
- CVP "trick" for CTF challenges☆146Updated 2 years ago
- O(n log n) algorithm finding solutions of Erdős-Ginzburg-Ziv theorem.☆14Updated 3 years ago
- 2025년 국민대학교 KPSC + AIM 스터디 - 강화학습을 이용한 체스 AI 만들기☆12Updated 3 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆247Updated 2 years ago
- LLL, MLL, BKZ, etc.☆10Updated 4 years ago
- Some writeups for some CTFs☆17Updated last year
- ☆30Updated 3 years ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆68Updated this week
- lattice-based zkSNARKs over libsnark [ISW21]☆34Updated last year
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆87Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆53Updated 3 weeks ago
- Some of Our Audit Reports, Presentations, etc☆13Updated last year
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Updated 6 months ago
- ☆12Updated 4 months ago
- Weighted Threshold Signature Benchmark☆14Updated 2 years ago
- Lattices in Cryptography (University of Michigan)☆102Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year