inmcm / Simon_Speck_Ciphers
Implementations of the Simon and Speck Block Ciphers
☆98Updated 6 years ago
Alternatives and similar repositories for Simon_Speck_Ciphers:
Users that are interested in Simon_Speck_Ciphers are comparing it to the libraries listed below
- ☆97Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Program for finding low gate count implementations of S-boxes.☆37Updated 2 months ago
- High-order countermeasures for AES and DES☆25Updated 5 months ago
- A Python implementation of the SPHINCS-256 scheme☆14Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆91Updated last year
- Analysis and generation of substitutions☆23Updated 2 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Updated 7 months ago
- Source code developed in the BLOC project☆20Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- ☆12Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago
- ☆32Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Framework for building transparent memory encryption and authentication solutions☆26Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆158Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆53Updated 7 years ago
- ☆48Updated 7 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆13Updated 7 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Updated 11 years ago