A Course in Cryptanalysis
☆154Oct 11, 2024Updated last year
Alternatives and similar repositories for course-cryptanalysis
Users that are interested in course-cryptanalysis are comparing it to the libraries listed below
Sorting:
- ☆67Nov 10, 2025Updated 3 months ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- A Sage interface for FGb (Gröbner basis computations)☆39Feb 1, 2026Updated last month
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆49Feb 27, 2026Updated last week
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆124Dec 21, 2024Updated last year
- ☆19Nov 22, 2025Updated 3 months ago
- my ctf chals☆11Jul 7, 2025Updated 8 months ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Fast lattice reduction☆233Aug 25, 2025Updated 6 months ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆30Feb 25, 2026Updated last week
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Feb 14, 2020Updated 6 years ago
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 7 months ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A collection of high-performance crypto implementations.☆53Nov 27, 2025Updated 3 months ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆56Jan 6, 2026Updated 2 months ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- ☆24Mar 4, 2025Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 2 years ago
- Compress sets of integers efficiently☆23Apr 17, 2025Updated 10 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 3 weeks ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Jan 13, 2024Updated 2 years ago
- ☆112Apr 22, 2025Updated 10 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- ☆18Feb 4, 2026Updated last month
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆18May 29, 2023Updated 2 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 5 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated last month
- Repo for collecting part of my public CTF challenges☆42Mar 25, 2024Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- A monorepo for vOPRF-based secure nullifiers☆22Apr 13, 2025Updated 10 months ago
- ☆68Apr 13, 2020Updated 5 years ago
- A toolkit for cryptanalysis using lattices.☆137Dec 2, 2023Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆251Jul 6, 2023Updated 2 years ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Jan 8, 2026Updated 2 months ago