johndoe31415 / toyecc
Elliptic Curve Cryptography playground/toolkit written in pure Python
☆66Updated last year
Related projects ⓘ
Alternatives and complementary repositories for toyecc
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- ☆32Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated 2 months ago
- ☆48Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆62Updated 3 months ago
- Haraka is a secure and efficient short-input hash function.☆52Updated 7 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆27Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆88Updated last year
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆50Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆19Updated 4 years ago
- Tool for generating Elliptic curve domain parameters☆109Updated 10 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- ☆50Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- ☆11Updated 2 years ago
- High-order countermeasures for AES and DES☆25Updated 3 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- Optimized implementation of the Picnic signature scheme☆79Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆61Updated last month
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆35Updated 6 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- NTRU Python Library with Application to Encrypted Domain☆29Updated 9 months ago