sethtroisi / cado-nfsLinks
CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, please see the project website. http://cado-nfs.gforge.inria.fr
☆28Updated 5 years ago
Alternatives and similar repositories for cado-nfs
Users that are interested in cado-nfs are comparing it to the libraries listed below
Sorting:
- Fast lattice reduction☆215Updated last month
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Tool for generating Elliptic curve domain parameters☆129Updated 6 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆86Updated 2 years ago
- Lattice algorithms using floating-point arithmetic☆373Updated this week
- The General Sieve Kernel☆124Updated 3 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆31Updated 8 months ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆35Updated 6 months ago
- A Python interface for https://github.com/fplll/fplll☆151Updated 4 months ago
- ☆44Updated 2 years ago
- ☆40Updated 3 years ago
- ECM Factorization on CUDA-GPUs☆13Updated 5 years ago
- A Sage interface for FGb (Gröbner basis computations)☆39Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated 2 weeks ago
- A Sage implementation of the ROCA attack☆24Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆68Updated this week
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆28Updated last month
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- Implementation of the fastest ISD algorithms☆23Updated 7 months ago
- ☆23Updated 3 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 10 years ago
- ☆20Updated last year
- Infer internal state of Mersenne Twister from truncated output☆76Updated 3 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆105Updated this week
- Complex multiplication based factorization☆39Updated 3 years ago
- Repository for the current status of the LESS submission☆12Updated 5 months ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year