lducas / SchnorrGateLinks
Testing Schnorr's factorization claim in Sage
☆303Updated 2 years ago
Alternatives and similar repositories for SchnorrGate
Users that are interested in SchnorrGate are comparing it to the libraries listed below
Sorting:
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- A pairing library of elliptic curve☆60Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Tool for generating Elliptic curve domain parameters☆122Updated 2 months ago
- The General Sieve Kernel☆119Updated last month
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- Lattice algorithms using floating-point arithmetic☆358Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- A Python interface for https://github.com/fplll/fplll☆143Updated last month
- Fast lattice reduction☆203Updated 3 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 10 months ago
- ☆66Updated 5 years ago
- Software of the NIST Post-Quantum submission NewHope☆46Updated 4 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆26Updated 5 years ago
- Standard curve database.☆110Updated 10 months ago
- Deployments of fancy cryptography☆145Updated 2 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated last week
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆142Updated 7 months ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Updated last year
- ☆17Updated 3 years ago
- A repository trying to collect things related to LLL☆71Updated 9 months ago
- CryptoBib Database for Developers☆44Updated 2 weeks ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- ☆183Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 7 years ago