lducas / leaky-LWE-Estimator
A sage Toolkit for mounting/estimating attacks on LWE with Side Information
☆38Updated last year
Related projects ⓘ
Alternatives and complementary repositories for leaky-LWE-Estimator
- CryptoBib BibTex files☆52Updated last month
- Lattices in Cryptography (University of Michigan)☆68Updated last month
- The General Sieve Kernel☆104Updated last week
- Security Estimation Scripts for Kyber and Dilithium☆25Updated 3 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆35Updated last month
- An attempt at a new LWE estimator☆225Updated this week
- Saber and NTRU on M4 and AVX2☆16Updated 2 years ago
- ☆16Updated 3 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆67Updated 3 months ago
- LaTeX package for typesetting pseudocode and cryptographic games☆156Updated 11 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- ☆39Updated 7 months ago
- ☆18Updated 5 years ago
- ☆52Updated 5 months ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆14Updated 4 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated this week
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Experiments with Universal Composability in EasyCrypt☆32Updated this week
- ☆31Updated last year
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 5 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆13Updated 4 years ago
- An open source project for study S-boxes☆38Updated 2 years ago
- Solving BDD and uSVP with predicate☆44Updated 3 months ago
- This is repository for python implementation of TFHE. We are plannning to use numpy and CuPy to support GPU accelaration.☆17Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- ☆11Updated 2 years ago