This repository contains code to generate and preprocess Learning with Errors (LWE) data and implementations of four LWE attacks uSVP, SALSA, Cool&Cruel, and Dual Hybrid Meet-in-the-Middle (MitM). We invite contributors to reproduce our results, improve on these methods, and/or suggest new concrete attacks on LWE.
☆59Apr 28, 2026Updated last week
Alternatives and similar repositories for LWE-benchmarking
Users that are interested in LWE-benchmarking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆56Aug 19, 2023Updated 2 years ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆52Mar 18, 2026Updated last month
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 3 years ago
- MEXMA: Token-level objectives improve sentence representations☆43Jan 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆17Oct 8, 2025Updated 7 months ago
- my ctf chals☆11Jul 7, 2025Updated 10 months ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Mar 18, 2025Updated last year
- 可快速部署的在线剪贴板工具☆14Aug 26, 2024Updated last year
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Lean cryptographic library usable for bare-metal environments☆87Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 6 months ago
- Code of Round5☆11May 4, 2020Updated 6 years ago
- A Python interface for https://github.com/fplll/fplll☆163Nov 14, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆12Apr 26, 2013Updated 13 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆85Feb 12, 2026Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-DSA / FIPS 204☆69Updated this week
- Large-Scale Graph Inference☆12Nov 6, 2024Updated last year
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Scripts relating to decryption failures in PQCRYPTO schemes☆11Feb 22, 2021Updated 5 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- The General Sieve Kernel☆149Nov 9, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Formal Analysis of the PQXDH Protocol☆31Jun 6, 2024Updated last year
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆219Dec 24, 2024Updated last year
- Fast lattice reduction☆238Aug 25, 2025Updated 8 months ago
- An attempt at a new LWE estimator☆354Apr 28, 2026Updated last week
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- ☆32Nov 10, 2024Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆54May 9, 2022Updated 4 years ago
- ☆10Mar 26, 2021Updated 5 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆63Jun 13, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- ☆35May 26, 2023Updated 2 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆29Jun 7, 2024Updated last year
- ☆16May 17, 2024Updated last year
- ☆12Jan 5, 2022Updated 4 years ago
- python黑帽子编程☆11Jun 10, 2021Updated 4 years ago