lducas / CodeRedLinks
Basis Reduction Algorithms for Codes (LLL and more)
☆27Updated last year
Alternatives and similar repositories for CodeRed
Users that are interested in CodeRed are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- ☆20Updated 5 years ago
- Differential Address Trace Analysis☆60Updated last year
- ☆22Updated 6 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆15Updated 5 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆129Updated 7 months ago
- The General Sieve Kernel☆132Updated last week
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆12Updated 4 years ago
- ☆17Updated last month
- C++ STL for speed and cryptanalytic application☆11Updated this week
- CHES 2022 White-box Cryptography Tutorial☆20Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆34Updated last year
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- ☆14Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Updated 4 years ago
- ☆38Updated 8 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated 11 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Updated 3 years ago
- Examples for EasyCrypt Lectures☆26Updated 2 months ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- CryptoBib Database for Developers☆45Updated last week