Flexibly construct and implement attacks on Learning Parity with Noise
☆11Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for lpn
Users that are interested in lpn are comparing it to the libraries listed below
Sorting:
- ☆13Sep 9, 2019Updated 6 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Implementation of the ZKB++ proof system☆20May 28, 2019Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- ☆19Nov 22, 2025Updated 3 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- Tools for studying S-boxes☆37Updated this week
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Security Estimation Scripts for Kyber and Dilithium☆48Mar 16, 2021Updated 4 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- A scalable anonymous blocklisting scheme☆12Oct 6, 2023Updated 2 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- A generic implementation of a Nested Monte Carlo Search for single player games☆11Jun 8, 2016Updated 9 years ago
- Library routines for the different pathloss model from 3GPP & ITU for IMT2020 evaluation & 5G simulation works☆17Oct 23, 2019Updated 6 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Pure Rust implementation of the post-quantum secure digital signature scheme FAEST☆16Feb 19, 2026Updated 2 weeks ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- the simulation about the physical layer key generation☆10Oct 11, 2021Updated 4 years ago
- ☆11Sep 10, 2024Updated last year
- A step-by-step implementation of a ResNet-18 model for image classification on the CIFAR-10 dataset☆10Dec 5, 2024Updated last year
- A C++ library for algebra over GF(2)☆16May 10, 2024Updated last year
- ☆12Sep 11, 2024Updated last year