j2kun / welch-berlekampView external linksLinks
☆13Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for welch-berlekamp
Users that are interested in welch-berlekamp are comparing it to the libraries listed below
Sorting:
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- An example implementation of WOLA BATCH for z/OS Connect Enterprise Edition, including COBOL source files, sample JCLs, a matching zCEE A…☆10Sep 1, 2020Updated 5 years ago
- ☆13Jan 5, 2024Updated 2 years ago
- Módulo de interface para o programa NEWAVE, lidando com escrita e leitura de arquivos de entrada e saída para auxiliar na realização de e…☆14Feb 2, 2026Updated last week
- Complex multiplication based factorization☆40Feb 21, 2022Updated 3 years ago
- A wrapper service for z/OS® Connect, enabling node applications to discover and access IBM z Systems resources that are service-enabled b…☆11Jan 28, 2026Updated 2 weeks ago
- Samples for use with IBM Dependency Based Build☆16Mar 15, 2019Updated 6 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- Dense Wireless Connectivity Datasets for the IoT.☆11Aug 13, 2019Updated 6 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- A personal homepage to start coding☆14Aug 1, 2019Updated 6 years ago
- Sequential anomaly detection method evaluation☆18Mar 9, 2013Updated 12 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- C++ code and Python wrappers for Inference on Bayesian Non-Parametric Models☆12May 22, 2013Updated 12 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- The official Go SDK for SPIKE, enabling secure secrets management through SPIFFE-authenticated mTLS. Simplifies secrets operations for Go…☆14Jan 20, 2026Updated 3 weeks ago
- A simple mailchimp-esque form in clojurescript and reagent☆10Feb 28, 2015Updated 10 years ago
- A plugin for Errbot that allows chat users to create "factoids" which the bot can recall on demand.☆10Jun 10, 2016Updated 9 years ago
- Code for Max-Margin Deep Generative Models☆12Jan 1, 2015Updated 11 years ago
- Spring 2017 Course Website☆10Dec 6, 2024Updated last year
- Adaptive Synthetic Sampling Approach for Imbalanced Learning☆13Jun 16, 2013Updated 12 years ago
- This Repository contains all the taxonomy feeder model files and scripts used to create them.☆11Jan 30, 2024Updated 2 years ago
- Cross-domain word representation learning☆10May 23, 2015Updated 10 years ago
- Fulcro Getting Started Guide☆11Apr 6, 2018Updated 7 years ago
- 🚀 A pomodoro app with collaboration and creativity.☆11Nov 28, 2023Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- A simple useful tutorial of boost☆12May 23, 2017Updated 8 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- Theano based deep ANN learning code☆38Oct 2, 2010Updated 15 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 6 months ago
- Sample REXX pub and sub clients for MQTT/Mosquitto☆12Nov 9, 2011Updated 14 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- The SPL Token Wrap program and its clients☆15Feb 6, 2026Updated last week
- ☆11Sep 6, 2022Updated 3 years ago
- a getting-started sample for Clojure and Solr☆11Aug 28, 2015Updated 10 years ago