☆16Jan 23, 2026Updated 2 months ago
Alternatives and similar repositories for deuring
Users that are interested in deuring are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated last year
- ☆46Feb 28, 2023Updated 3 years ago
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆17May 17, 2024Updated last year
- Is SIKE broken yet?☆21Feb 15, 2023Updated 3 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- A Dark theme for VS Code☆13Apr 1, 2021Updated 4 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- Supersingular Isogeny Diffie-Hellman in Rust☆20Nov 10, 2021Updated 4 years ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆19Oct 11, 2020Updated 5 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- LZ4 decoder in assembly for RiscV RV32IC☆12Feb 11, 2022Updated 4 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- ☆42May 29, 2024Updated last year
- ☆25Dec 9, 2024Updated last year
- LaTeX Overlay Generator☆15Apr 12, 2016Updated 9 years ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- ☆18Updated this week
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Jan 13, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof assistant for qRHL☆22Mar 9, 2026Updated 3 weeks ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated last month
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- ☆113Apr 22, 2025Updated 11 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- Challenge source code and author write-ups for KalmarCTF☆70Jan 7, 2026Updated 2 months ago