lducas / BDD-note
☆13Updated 3 years ago
Alternatives and similar repositories for BDD-note:
Users that are interested in BDD-note are comparing it to the libraries listed below
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 11 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 5 months ago
- ☆19Updated 6 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- ☆35Updated 7 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- ☆29Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- ☆18Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Examples for EasyCrypt Lectures☆24Updated 2 weeks ago
- ☆39Updated 8 months ago
- Optimized Binary GCD for Modular Inversion☆41Updated 4 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆10Updated this week
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- ☆34Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆27Updated last week
- CryptoBib Main Repository for Developers☆19Updated 5 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 8 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- Banquet implementation☆13Updated 2 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- High Assurance Cryptographic Software☆10Updated 2 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆59Updated 7 months ago