lducas / BDD-note
☆13Updated 3 years ago
Alternatives and similar repositories for BDD-note:
Users that are interested in BDD-note are comparing it to the libraries listed below
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 6 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago
- ☆19Updated 6 years ago
- C++ STL for speed and cryptanalytic application☆10Updated this week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- Examples for EasyCrypt Lectures☆24Updated last month
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- ☆35Updated 7 years ago
- Crypto library☆56Updated this week
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆60Updated 8 months ago
- Banquet implementation☆13Updated 2 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆28Updated last month
- ☆19Updated 5 years ago
- An implementation of the LowMC block cipher family.☆26Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- ☆39Updated 9 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated 9 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 7 months ago
- ☆35Updated 2 years ago
- ☆46Updated this week
- Implicit White-box Implementations of ARX Ciphers☆14Updated 2 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 5 years ago
- MAYO C implementation☆15Updated last week
- White-box cryptography based on FAPKC algorithm☆26Updated last month
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- ☆28Updated 3 years ago