lducas / BDD-noteLinks
☆12Updated 3 years ago
Alternatives and similar repositories for BDD-note
Users that are interested in BDD-note are comparing it to the libraries listed below
Sorting:
- Basis Reduction Algorithms for Codes (LLL and more)☆27Updated last year
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 9 months ago
- ☆35Updated 8 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- ☆16Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆21Updated this week
- Examples for EasyCrypt Lectures☆24Updated 4 months ago
- ☆14Updated this week
- A programming language to write bitsliced ciphers☆56Updated 9 months ago
- Implicit White-box Implementations of ARX Ciphers☆14Updated 2 years ago
- ☆49Updated this week
- C++ STL for speed and cryptanalytic application☆10Updated last month
- MAYO C implementation☆16Updated 2 months ago
- CryptoBib Database for Developers☆44Updated last week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 4 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆40Updated last year
- ☆19Updated 6 years ago
- ☆20Updated 5 years ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- ☆12Updated 2 years ago
- ☆14Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- An implementation of the LowMC block cipher family.☆27Updated 7 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- ☆13Updated 4 years ago
- The Romulus family of lightweight cryptographic algorithms (authenticated encryption and hashing).☆9Updated 2 years ago
- A polymorphic interface for elliptic curve operations☆42Updated last year