sethtroisi / cado-nfsLinks
CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, please see the project website. http://cado-nfs.gforge.inria.fr
☆26Updated 5 years ago
Alternatives and similar repositories for cado-nfs
Users that are interested in cado-nfs are comparing it to the libraries listed below
Sorting:
- Tool for generating Elliptic curve domain parameters☆122Updated 2 months ago
- The General Sieve Kernel☆119Updated last month
- Fast lattice reduction☆203Updated 3 months ago
- ☆41Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- Lattice algorithms using floating-point arithmetic☆358Updated last month
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆33Updated 2 months ago
- A Python interface for https://github.com/fplll/fplll☆143Updated 3 weeks ago
- ☆39Updated 3 years ago
- ☆31Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated last week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 4 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 2 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆96Updated 3 months ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆28Updated 2 months ago
- A Sage interface for FGb (Gröbner basis computations)☆34Updated last year
- ☆17Updated 5 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆96Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 10 months ago
- A Sage implementation of the ROCA attack☆23Updated 2 years ago
- Crypto library☆60Updated this week
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆26Updated 3 years ago
- Solving BDD and uSVP with predicate☆48Updated 10 months ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- Solve discrete logarithm problems by the index calculus method.☆14Updated 7 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year