Calculate the AES-128 key schedule given any round key
☆51Jan 26, 2024Updated 2 years ago
Alternatives and similar repositories for aeskeyschedule
Users that are interested in aeskeyschedule are comparing it to the libraries listed below
Sorting:
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated last month
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- Repo for collecting part of my public CTF challenges☆43Mar 25, 2024Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated 2 months ago
- M4RI is a library for fast arithmetic with dense matrices over GF(2)☆88Feb 23, 2026Updated 3 weeks ago
- ☆12Jun 22, 2021Updated 4 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- AVX512 population count routines☆23Aug 2, 2019Updated 6 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- voice active detection (python ver/simple and easy-to-use)☆12May 1, 2017Updated 8 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆83Feb 12, 2026Updated last month
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆29Sep 27, 2025Updated 5 months ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Dec 17, 2025Updated 3 months ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 4 months ago
- M4GB: Efficient Groebner Basis algorithm☆71Nov 27, 2018Updated 7 years ago
- Sigrok ISO7816 (Smartcard) decoder☆14Apr 1, 2025Updated 11 months ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- Anonymous Credit Tokens implementation in Rust☆26Mar 2, 2026Updated 2 weeks ago
- Remove upvote and comment counts from Hacker News.☆16Jul 15, 2020Updated 5 years ago
- Altera USB-Blaster-compatible programmer on Raspberry Pi Pico☆28Nov 3, 2024Updated last year
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆21May 1, 2022Updated 3 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆104Sep 8, 2023Updated 2 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- ☆15Oct 2, 2023Updated 2 years ago
- Voice Activity Detection: In this first assignment, we will create a dataset that simulates speech in every-day scenarios. We train a cla…☆18May 3, 2015Updated 10 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- ☆44Dec 5, 2025Updated 3 months ago
- ☆11Nov 17, 2025Updated 4 months ago
- Proof of concept code for running RLWE schemes on long integer multiplier co-processors☆20Nov 26, 2021Updated 4 years ago
- Unix-inspired shell and RAM filesystem for the Commodore 64 (6502 assembly) / AI-assisted development☆23Feb 27, 2026Updated 3 weeks ago
- Web server to receive uploaded LaTeX and execute it in a docker container.☆16Updated this week
- ☆10Jul 16, 2025Updated 8 months ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago