☆12Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for BDD-note
Users that are interested in BDD-note are comparing it to the libraries listed below
Sorting:
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Repository for the current status of the LESS submission☆13Feb 4, 2026Updated 3 weeks ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14May 15, 2020Updated 5 years ago
- ☆16Jun 24, 2024Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- A solver for the (unicost) set covering problem☆23Dec 21, 2025Updated 2 months ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Oblivious DoH library☆17Feb 21, 2022Updated 4 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 5 years ago
- ☆19Nov 22, 2025Updated 3 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Arithmetic circuits for zero knowledge proof systems☆83Apr 16, 2024Updated last year
- ☆17Aug 2, 2021Updated 4 years ago
- Cryptography & CTF Writeups☆83Feb 20, 2023Updated 3 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- Compress sets of integers efficiently☆23Apr 17, 2025Updated 10 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Aug 5, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Implementation of the fastest ISD algorithms☆23Feb 21, 2025Updated last year
- ☆104Jan 3, 2022Updated 4 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Examples for EasyCrypt Lectures☆28Jan 28, 2026Updated last month
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- Signcryption using libsodium.☆68Jan 1, 2026Updated 2 months ago
- Cochlear implant signal processing☆10Jun 24, 2021Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 2 years ago