iaikkrypto / lineartrailsView external linksLinks
Tool to automatically search for linear characteristics
☆39Jan 27, 2016Updated 10 years ago
Alternatives and similar repositories for lineartrails
Users that are interested in lineartrails are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2014Updated 11 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 3 months ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Sep 8, 2023Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Jan 17, 2022Updated 4 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- Decompiler for Python 3.3 (forked from https://code.google.com/p/unpyc3)☆70Sep 3, 2014Updated 11 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- LeetCode OJ's Binary Tree Visualization in Python☆12Nov 19, 2016Updated 9 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆29Jan 3, 2026Updated last month