hadipourh / zeroLinks
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
☆11Updated 10 months ago
Alternatives and similar repositories for zero
Users that are interested in zero are comparing it to the libraries listed below
Sorting:
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆28Updated last month
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆67Updated this week
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Updated 2 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆29Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆11Updated 4 months ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Updated 4 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆17Updated 5 years ago
- ☆11Updated 5 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆109Updated 2 weeks ago
- An open source project for study S-boxes☆44Updated 3 years ago
- ☆10Updated 6 years ago
- ☆12Updated 4 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Updated 4 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated this week
- ☆17Updated 7 years ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆37Updated 6 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆31Updated 7 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆104Updated this week
- ☆10Updated 5 years ago
- ☆17Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆40Updated 11 months ago
- MLKEM implementation optimized for embedded microcontrollers☆25Updated last year
- MAYO C implementation☆19Updated 6 months ago
- ☆43Updated 2 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆15Updated last year
- Raccoon Signature Scheme -- Reference Code☆11Updated 2 years ago