White-box cryptography based on FAPKC algorithm
☆29Dec 31, 2025Updated 3 months ago
Alternatives and similar repositories for white-box-fapkc
Users that are interested in white-box-fapkc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 5 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Pairing-friendly elliptic curve library☆24Aug 15, 2024Updated last year
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- Go package to connect to Ledger devices☆19Mar 19, 2026Updated last month
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Nov 25, 2024Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- gkr-mimc is a POC-grad gnark gadget to accelerate the proving time of Mimc computation☆25Jun 24, 2024Updated last year
- White-box analytic framework based on LLVM☆38Jun 10, 2019Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21Sep 6, 2020Updated 5 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- MoonShard chat React Native cross platform application (iOS/Android)☆10Jan 4, 2023Updated 3 years ago
- Ethereum Token Implementing RingCT☆24Jul 18, 2018Updated 7 years ago
- Transfer learning on Inception-v3 using the BreakHis dataset.☆11Dec 5, 2018Updated 7 years ago
- ☆15Mar 28, 2015Updated 11 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 8 years ago
- ARCHIVED: ETHOnline 2020 winner. For latest version and more information, contact hi@erdstall.dev☆12May 5, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆42May 29, 2024Updated last year
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆18Sep 29, 2020Updated 5 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- ☆20Dec 13, 2019Updated 6 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆39Jan 15, 2024Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- ☆16Jan 4, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a whiteboxed DES implementation based on Chow et al paper☆30Mar 3, 2015Updated 11 years ago
- Remote Control Car Simulation App -- ARCore (Augmented Reality) | Android | Unity☆18Jun 15, 2019Updated 6 years ago
- Filecoin consensus work☆41Mar 1, 2022Updated 4 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- ☆36Nov 22, 2023Updated 2 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- ☆18Mar 28, 2015Updated 11 years ago