Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
☆26Nov 25, 2024Updated last year
Alternatives and similar repositories for thesis
Users that are interested in thesis are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆77Jan 27, 2022Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆41May 21, 2025Updated 9 months ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- White-box cryptography based on FAPKC algorithm☆28Dec 31, 2025Updated last month
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- Lattice algorithms using floating-point arithmetic☆393Oct 15, 2025Updated 4 months ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Jun 24, 2020Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- C++ iterator that performs the cartesian product of many containers.☆11Jan 12, 2016Updated 10 years ago
- ☆42May 29, 2024Updated last year
- ☆42Jun 27, 2022Updated 3 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago
- Limits asset outflows from contracts within customisable timeframes☆11May 7, 2022Updated 3 years ago
- ztc 涵盖大量zabbix的监控模板,修改了其中的nginx和php用来更好的完成监控工作☆12Dec 31, 2014Updated 11 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Transfer learning on Inception-v3 using the BreakHis dataset.☆11Dec 5, 2018Updated 7 years ago
- Re-implementation of Lambda Twist P3P solver (ECCV 2018)☆13Dec 10, 2021Updated 4 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Create printable flash cards from Secureum list based articles☆10Apr 12, 2023Updated 2 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- This used to be the homepage loaded when you opened the Onion Browser app. Now the app has a built-in locally-rendered homepage.☆15Feb 25, 2020Updated 6 years ago
- ☆13Nov 23, 2019Updated 6 years ago
- Joway's Gallery☆10Nov 11, 2023Updated 2 years ago