sethtroisi / gmp-ecm
Imported from svn://scm.gforge.inria.fr/svnroot/ecm/
☆21Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for gmp-ecm
- An implementation of Dumer's algorithm for Information Set Decoding.☆12Updated 10 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆26Updated 2 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- ☆35Updated 2 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆16Updated last year
- Haraka is a secure and efficient short-input hash function.☆52Updated 7 years ago
- Tool for generating Elliptic curve domain parameters☆109Updated 10 months ago
- ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)☆14Updated 3 years ago
- ☆31Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 8 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆25Updated 3 weeks ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆14Updated 5 months ago
- Fast lattice reduction☆170Updated 3 months ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆22Updated 4 years ago
- The General Sieve Kernel☆104Updated last week
- Fast constant-time AES implementations on 32-bit architectures☆62Updated last month
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated last year
- masked, bit-sliced AES-128 demo code☆13Updated 7 years ago
- Complex multiplication based factorization☆35Updated 2 years ago
- Implementation of the fastest ISD algorithms☆18Updated 2 weeks ago
- QARMA block cipher in C☆24Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 4 months ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Solutions to https://cryptopals.com problems☆26Updated 11 months ago
- betrusted.io main SoC design☆12Updated 4 years ago
- Solve discrete logarithm problems by the number field sieve method.☆17Updated 7 years ago
- Analysis and generation of substitutions☆22Updated 2 years ago
- ☆15Updated 3 years ago