lducas / SchnorrGateLinks
Testing Schnorr's factorization claim in Sage
☆304Updated 2 years ago
Alternatives and similar repositories for SchnorrGate
Users that are interested in SchnorrGate are comparing it to the libraries listed below
Sorting:
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Lattice algorithms using floating-point arithmetic☆361Updated 2 months ago
- The General Sieve Kernel☆119Updated last week
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆127Updated 3 months ago
- A pairing library of elliptic curve☆60Updated last year
- A Python interface for https://github.com/fplll/fplll☆143Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- ☆66Updated 5 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 11 months ago
- Factoring as a Service☆265Updated last week
- Fast lattice reduction☆206Updated 3 months ago
- Standard curve database.☆114Updated last week
- ☆23Updated 3 years ago
- Software of the NIST Post-Quantum submission NewHope☆46Updated 4 years ago
- ☆450Updated 2 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆96Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year
- ☆40Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Updated last year
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- CryptoBib Database for Developers☆45Updated last month
- A Sage interface for FGb (Gröbner basis computations)☆34Updated last year
- ☆17Updated 3 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 4 years ago
- A Course in Cryptanalysis☆144Updated 9 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- Deployments of fancy cryptography☆146Updated 2 months ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆242Updated 2 years ago