lducas / leaky-LWE-EstimatorView external linksLinks
A sage Toolkit for mounting/estimating attacks on LWE with Side Information
☆54Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for leaky-LWE-Estimator
Users that are interested in leaky-LWE-Estimator are comparing it to the libraries listed below
Sorting:
- ☆35May 26, 2023Updated 2 years ago
- An attempt at a new LWE estimator☆340Updated this week
- ☆10Apr 13, 2020Updated 5 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆42Mar 31, 2025Updated 10 months ago
- A Python interface for https://github.com/fplll/fplll☆160Nov 14, 2025Updated 3 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 2 months ago
- ☆15Mar 14, 2023Updated 2 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆52Sep 26, 2024Updated last year
- Saber and NTRU on M4 and AVX2☆18Jan 15, 2022Updated 4 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- ☆13Nov 2, 2023Updated 2 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 6 months ago
- Lattice algorithms using floating-point arithmetic☆394Oct 15, 2025Updated 4 months ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated last year
- Hardware implementation of Saber☆10Jul 14, 2020Updated 5 years ago
- ☆17Feb 21, 2022Updated 3 years ago
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆18Jun 11, 2025Updated 8 months ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆48Nov 3, 2025Updated 3 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Security Estimation Scripts for Kyber and Dilithium☆48Mar 16, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Mar 3, 2016Updated 9 years ago
- ☆44Feb 28, 2023Updated 2 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Sep 10, 2018Updated 7 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 3 years ago
- ☆13Oct 9, 2024Updated last year
- ☆15Nov 18, 2024Updated last year
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 10 months ago
- Verifiable FHE prototype☆27Aug 12, 2024Updated last year
- Coppersmith's method for multivariate polynomials☆192Oct 11, 2023Updated 2 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆401Jan 6, 2026Updated last month