friends-of-quaternions / deuring
☆14Updated last year
Alternatives and similar repositories for deuring
Users that are interested in deuring are comparing it to the libraries listed below
Sorting:
- ☆39Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆129Updated 2 years ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆19Updated 4 months ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Updated last month
- Representing DES in Z3☆15Updated last year
- A Sage interface for FGb (Gröbner basis computations)☆34Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 9 months ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- ☆66Updated 5 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 8 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆44Updated last year
- ☆13Updated 3 years ago
- The General Sieve Kernel☆117Updated this week
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆96Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆64Updated this week
- ☆31Updated last year
- Solving BDD and uSVP with predicate☆48Updated 9 months ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆35Updated 6 months ago
- ☆33Updated last year
- ☆45Updated 2 weeks ago
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆17Updated 4 years ago
- ☆49Updated 3 weeks ago
- Examples for EasyCrypt Lectures☆24Updated 3 months ago
- Sage implementation of the MAYO scheme☆14Updated 3 months ago
- ☆21Updated 2 months ago