haael / white-box-fapkc
White-box cryptography based on FAPKC algorithm
☆24Updated last month
Related projects: ⓘ
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 6 months ago
- ☆19Updated this week
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- ☆13Updated 2 years ago
- ☆14Updated 4 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- ☆19Updated 4 years ago
- poststructural fuzzing☆31Updated 4 years ago
- Auditing Applied Cryptography☆10Updated 4 years ago
- ☆12Updated 4 years ago
- ☆22Updated 2 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆24Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- Attacks on Jarvis and Friday☆10Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Differential fuzzing for elliptic curves☆22Updated last year
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated 4 months ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 4 years ago
- Optimized Binary GCD for Modular Inversion☆42Updated 3 years ago
- ☆35Updated 4 years ago
- CHES 2022 White-box Cryptography Tutorial☆19Updated last year
- ☆34Updated 7 years ago
- ☆12Updated this week
- A bitsliced implementation of ECB and CTR AES☆46Updated last month
- Differential Address Trace Analysis☆51Updated 5 months ago
- Tool for generating Elliptic curve domain parameters☆106Updated 8 months ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆13Updated 3 years ago
- Example Manticore scripts☆68Updated 9 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆33Updated last year