hadipourh / zeroLinks
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
☆12Updated last year
Alternatives and similar repositories for zero
Users that are interested in zero are comparing it to the libraries listed below
Sorting:
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆29Updated 3 weeks ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆73Updated this week
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆31Updated last year
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Updated 5 years ago
- ☆13Updated 3 weeks ago
- Raccoon Signature Scheme -- Reference Code☆12Updated 2 years ago
- ☆12Updated 4 years ago
- ☆11Updated 5 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆120Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- ☆10Updated 5 years ago
- ☆23Updated 7 years ago
- MAYO C implementation☆21Updated 10 months ago
- Security Estimation Scripts for Kyber and Dilithium☆46Updated 4 years ago
- CryptoBib Database for Developers☆46Updated last week
- This repository contains code to generate and preprocess Learning with Errors (LWE) data and implementations of four LWE attacks uSVP, SA…☆59Updated last week
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- ☆19Updated 2 months ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Updated 5 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Updated 6 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- ☆44Updated 2 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆40Updated 10 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago