A sage Toolkit for mounting/estimating attacks on LWE with Side Information
☆56Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for leaky-LWE-Estimator
Users that are interested in leaky-LWE-Estimator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35May 26, 2023Updated 2 years ago
- An attempt at a new LWE estimator☆348Updated this week
- ☆10Apr 13, 2020Updated 5 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆44Mar 31, 2025Updated 11 months ago
- A Python interface for https://github.com/fplll/fplll☆160Nov 14, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated 2 weeks ago
- Saber and NTRU on M4 and AVX2☆18Jan 15, 2022Updated 4 years ago
- ☆13Nov 2, 2023Updated 2 years ago
- Security Estimation Scripts for Kyber and Dilithium☆54Mar 16, 2021Updated 5 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- Hardware implementation of Saber☆10Jul 14, 2020Updated 5 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 7 months ago
- ☆15Mar 14, 2023Updated 3 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆52Sep 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- ☆17Mar 11, 2026Updated 2 weeks ago
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆48Mar 18, 2026Updated last week
- ☆23Jan 21, 2019Updated 7 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- ☆14Apr 8, 2022Updated 3 years ago
- ☆577Oct 8, 2025Updated 5 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆414Jan 6, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆19Jun 11, 2025Updated 9 months ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 9 months ago
- This repository contains code to generate and preprocess Learning with Errors (LWE) data and implementations of four LWE attacks uSVP, SA…☆59Feb 24, 2026Updated last month
- ☆11Jul 14, 2025Updated 8 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Fast lattice reduction☆233Aug 25, 2025Updated 7 months ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Sep 10, 2018Updated 7 years ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber☆289Dec 17, 2025Updated 3 months ago
- ☆42Jun 27, 2022Updated 3 years ago
- ☆1,173Feb 16, 2025Updated last year
- A python implementation of the signature scheme Falcon☆192Jan 13, 2026Updated 2 months ago
- Realizing private and practical pharmacological collaboration☆15Oct 19, 2018Updated 7 years ago