hellman / thesisLinks
Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
☆26Updated last year
Alternatives and similar repositories for thesis
Users that are interested in thesis are comparing it to the libraries listed below
Sorting:
- ☆68Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- SageMath/Python Toolkit for Cryptanalytic Research☆41Updated 8 months ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- White-box Analysis and Implementation Tools☆78Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- ☆20Updated 6 years ago
- rkm0959 implements stuff☆45Updated 3 years ago
- A repository trying to collect things related to LLL☆73Updated last year
- ☆15Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Updated 2 years ago
- CVP "trick" for CTF challenges☆150Updated 2 years ago
- ☆38Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Updated 2 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆66Updated last month
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Updated 2 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Updated 5 years ago
- A pairing library of elliptic curve☆60Updated last year
- Implementation of the ROCA attack☆17Updated 5 years ago
- ☆12Updated 4 years ago