☆12Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for BDD-note
Users that are interested in BDD-note are comparing it to the libraries listed below
Sorting:
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Oblivious DoH library☆17Feb 21, 2022Updated 4 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14May 15, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Repository for the current status of the LESS submission☆13Updated this week
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- ☆16Jun 24, 2024Updated last year
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 5 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- ☆19Nov 22, 2025Updated 4 months ago
- A C implementation of Agrawal-Kayal-Saxena (AKS) primality test algorithm.☆17Oct 25, 2021Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Compress sets of integers efficiently☆23Apr 17, 2025Updated 11 months ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Arithmetic circuits for zero knowledge proof systems☆83Apr 16, 2024Updated last year
- A solver for the (unicost) set covering problem☆23Dec 21, 2025Updated 3 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- Signcryption using libsodium.☆69Jan 1, 2026Updated 2 months ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Implementation of the fastest ISD algorithms☆23Feb 21, 2025Updated last year
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Microbenchmarks for Aarch64 (Cortex A53)☆12Apr 19, 2023Updated 2 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago