squell / bb-scripts
bash scripts for the ELO of RU
☆11Updated last year
Related projects: ⓘ
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated last month
- CryptoBib Database for Developers☆40Updated last week
- CryptoBib Main Repository for Developers☆18Updated last month
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆27Updated 3 months ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- ☆97Updated 8 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆21Updated 2 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆87Updated last year
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- ☆11Updated last year
- ☆16Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollers☆13Updated last month
- ☆22Updated 2 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆35Updated 6 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆47Updated 2 years ago
- ☆11Updated 2 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- CryptoBib BibTex files☆50Updated last week
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆43Updated 7 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆21Updated 5 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆14Updated 4 years ago
- ☆13Updated last week
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆61Updated last month
- ☆12Updated this week
- Post-quantum cryptography certificates☆36Updated 2 weeks ago
- Pure Python implementation of standard elliptic curves☆17Updated 2 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆18Updated 3 months ago