malb / m4riLinks
M4RI is a library for fast arithmetic with dense matrices over GF(2)
☆84Updated last week
Alternatives and similar repositories for m4ri
Users that are interested in m4ri are comparing it to the libraries listed below
Sorting:
- M4GB: Efficient Groebner Basis algorithm☆71Updated 7 years ago
- Library for Polynomial System Solving through Algebraic Methods☆165Updated last week
- Bosphorus, ANF simplifier and solver, and ANF-to-CNF converter☆76Updated 8 months ago
- A Sage interface for FGb (Gröbner basis computations)☆39Updated last year
- Lattice algorithms using floating-point arithmetic☆386Updated last month
- A Python interface for https://github.com/fplll/fplll☆157Updated last month
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆44Updated last month
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Updated 6 years ago
- Fast lattice reduction☆224Updated 3 months ago
- Tools for studying S-boxes☆37Updated 2 weeks ago
- The General Sieve Kernel☆134Updated last month
- Implementation of the fastest ISD algorithms☆23Updated 9 months ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆37Updated 8 months ago
- An open source project for study S-boxes☆45Updated 3 years ago
- ☆14Updated last year
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Updated 2 years ago
- Python library for vectorial Boolean functions in cryptography☆11Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- Representing DES in Z3☆16Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆135Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆38Updated last year
- ☆44Updated 2 years ago
- ☆12Updated 4 years ago
- ☆35Updated 2 years ago
- Analysis and generation of substitutions☆25Updated last month
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Updated 2 weeks ago
- Implicit White-box Implementations of ARX Ciphers☆16Updated 3 years ago