luminousmen / ZUCLinks
Stream cipher ZUC - core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3.
☆24Updated 2 years ago
Alternatives and similar repositories for ZUC
Users that are interested in ZUC are comparing it to the libraries listed below
Sorting:
- Implementation for ZUC stream cipher☆16Updated 9 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆23Updated 3 months ago
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- ChaCha20 stream cipher in C☆29Updated last year
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Implementations of some lightweight block ciphers in C☆19Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Updated 5 months ago
- Meltdown/Spectre experiments☆54Updated 7 years ago
- Simple and secure ECC and ECDSA☆59Updated 2 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Updated 3 years ago
- Meltdown/Spectre PoC src collection.☆509Updated 7 years ago
- RSAEuro Crypto Library Internet Release version☆51Updated 2 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- Implementation for Chinese National Standard Ciphers☆43Updated 12 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Source code developed in the BLOC project☆20Updated 6 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 4 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆19Updated 8 years ago
- ELF packer for i386☆32Updated 9 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆12Updated 4 years ago
- OCB-AES authenticated encryption for Python☆13Updated 3 years ago
- Post-quantum Cryptography LWE (Learning with Errors) Library☆57Updated 2 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago