lducas / CodeRedLinks
Basis Reduction Algorithms for Codes (LLL and more)
☆27Updated last year
Alternatives and similar repositories for CodeRed
Users that are interested in CodeRed are comparing it to the libraries listed below
Sorting:
- ☆12Updated 3 years ago
- Python library for vectorial Boolean functions in cryptography☆10Updated last year
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- ☆15Updated 4 years ago
- White-box cryptography based on FAPKC algorithm☆26Updated 5 months ago
- C++ STL for speed and cryptanalytic application☆10Updated last week
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 5 years ago
- ☆20Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆125Updated 3 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 10 months ago
- ☆16Updated last month
- ☆40Updated last year
- Differential Address Trace Analysis☆57Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated last year
- ☆19Updated 6 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- ☆41Updated 2 years ago
- ☆35Updated 8 years ago
- The General Sieve Kernel☆119Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- ☆14Updated last year
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- Examples for EasyCrypt Lectures☆24Updated last week
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago