☆15Jan 23, 2026Updated last month
Alternatives and similar repositories for deuring
Users that are interested in deuring are comparing it to the libraries listed below
Sorting:
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- ☆44Feb 28, 2023Updated 3 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆17May 17, 2024Updated last year
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- Is SIKE broken yet?☆20Feb 15, 2023Updated 3 years ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- Proof assistant for qRHL☆22Feb 5, 2026Updated last month
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Aug 5, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 5 years ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆28Oct 7, 2021Updated 4 years ago
- Quantum implementation of elliptic curve primitives☆34May 20, 2022Updated 3 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 2 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Verifying encodings into propositional logic in Lean☆14Aug 14, 2023Updated 2 years ago
- Matrix Product State algorithm for computing characters of the symmetric group S_n☆11Sep 26, 2025Updated 5 months ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Using SVF in Python Projects☆15Updated this week
- This RocketchatApp validates uploaded images against the Microsoft PhotoDNA cloud service and quarantines those identified as child abuse…☆12Nov 17, 2025Updated 3 months ago
- ☆10Apr 10, 2020Updated 5 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Experiments with Universal Composability in EasyCrypt☆44Updated this week
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- Conceal a disk partition from Windows☆13Feb 24, 2016Updated 10 years ago