hkscy / Basic-SPN-cryptanalysisLinks
A Basic SPN cryptanalysis
☆15Updated 4 years ago
Alternatives and similar repositories for Basic-SPN-cryptanalysis
Users that are interested in Basic-SPN-cryptanalysis are comparing it to the libraries listed below
Sorting:
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Updated 5 years ago
- Tools for studying S-boxes☆37Updated this week
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆39Updated last year
- ☆11Updated 5 years ago
- ☆13Updated 4 years ago
- ☆18Updated 7 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Updated 7 years ago
- An open source project for study S-boxes☆45Updated 3 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Updated 7 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆73Updated this week
- ☆23Updated 7 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Updated 9 years ago
- ☆17Updated 8 years ago
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆77Updated 6 years ago
- ☆11Updated 7 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Updated last year
- Sage implementation of the MAYO scheme☆14Updated last year
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Updated 5 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆56Updated last month
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆250Updated 2 years ago
- Flexibly construct and implement attacks on Learning Parity with Noise☆11Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- The General Sieve Kernel☆141Updated 2 months ago
- ☆10Updated 5 years ago
- ☆12Updated 3 years ago
- ☆57Updated last year
- Solving BDD and uSVP with predicate☆51Updated last year