The GIFT Block Cipher
☆13Nov 11, 2025Updated 6 months ago
Alternatives and similar repositories for gift
Users that are interested in gift are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 21, 2020Updated 6 years ago
- This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do d…☆17Jul 18, 2019Updated 6 years ago
- ☆39Dec 16, 2021Updated 4 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆11Mar 28, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- A collection of Ascon implementations & documents (as submodules)☆56Mar 30, 2026Updated last month
- ☆14Mar 3, 2021Updated 5 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆78Updated this week
- A SUS (Sliding Universal Score) parser and generator.☆10Feb 12, 2022Updated 4 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14May 12, 2026Updated last week
- ☆14Feb 9, 2026Updated 3 months ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- Standard libraries for audio processing, especially STFT and Spherical Harmonics decomposition of a soundfield.☆10Nov 29, 2021Updated 4 years ago
- ☆16Apr 12, 2024Updated 2 years ago
- Reference implementation and test synthetic data for Sorted Center Time echo density measure for acoustic impulse responses☆15Mar 18, 2020Updated 6 years ago
- ☆14Apr 18, 2023Updated 3 years ago
- Jupyter notebooks used in NASA ARSET training on SAR interferometry applications☆33Apr 22, 2026Updated last month
- Audio-only Emotion Detection using Federated Learning☆10Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆35Aug 21, 2025Updated 9 months ago
- MVDR beamformer written in python☆10Jul 2, 2021Updated 4 years ago
- Solving various PDEs by employing Siren, with JAX implementation.☆10Apr 13, 2025Updated last year
- ☆12Jun 2, 2021Updated 4 years ago
- ☆22Apr 13, 2026Updated last month
- IMBS-MT (Independent Multimodal Background Subtraction multi-tread) is designed for performing an accurate foreground extraction in real-…☆10Dec 29, 2016Updated 9 years ago
- ☆11Mar 31, 2023Updated 3 years ago
- ☆25Jan 20, 2026Updated 4 months ago
- Mixtures of von Mises-Fisher Distributions☆13Mar 23, 2015Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sampling and visualising the von Mises-Fisher distribution. An important hyper-spherical distribution.☆16Jun 5, 2020Updated 5 years ago
- 龙花菜,以公主连结Re:Dive和龙图为主要服务的QQ机器人。☆12Jun 22, 2022Updated 3 years ago
- Semantic Segmentation and Foreground and Background Separation☆13Mar 19, 2020Updated 6 years ago
- Federated Learning on Energy Dataset for load forecasting using clustering and sequential DNN methods☆14Sep 19, 2024Updated last year
- ☆12Dec 14, 2021Updated 4 years ago
- ☆15Nov 9, 2025Updated 6 months ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 3 years ago