sethtroisi / cado-nfsLinks
CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, please see the project website. http://cado-nfs.gforge.inria.fr
☆30Updated 5 years ago
Alternatives and similar repositories for cado-nfs
Users that are interested in cado-nfs are comparing it to the libraries listed below
Sorting:
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- Fast lattice reduction☆225Updated 4 months ago
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Updated 2 years ago
- ☆41Updated 3 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆38Updated 9 months ago
- The General Sieve Kernel☆141Updated 2 months ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆42Updated last month
- ☆44Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆90Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆66Updated last month
- Complex multiplication based factorization☆40Updated 3 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆28Updated last week
- ECM Factorization on CUDA-GPUs☆14Updated 5 years ago
- A Sage interface for FGb (Gröbner basis computations)☆39Updated last year
- Lattice algorithms using floating-point arithmetic☆388Updated 2 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆41Updated 7 months ago
- A Python interface for https://github.com/fplll/fplll☆159Updated last month
- ☆68Updated 5 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- A Sage implementation of the ROCA attack☆27Updated 2 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆34Updated 2 months ago
- C++ STL for speed and cryptanalytic application☆11Updated 3 weeks ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- ☆20Updated last year
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆141Updated last year
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago