Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms
☆33Jan 17, 2022Updated 4 years ago
Alternatives and similar repositories for yaarx
Users that are interested in yaarx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆104Updated this week
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Jan 24, 2019Updated 7 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Jun 24, 2020Updated 5 years ago
- Tools for studying S-boxes☆38Updated this week
- ☆13Mar 3, 2021Updated 5 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 8 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Introduction about SIMD instructions. Mainly about SSE and AVX.☆13Mar 13, 2018Updated 8 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- espresso logic minimizer (https://embedded.eecs.berkeley.edu/pubs/downloads/espresso/index.htm)☆17Oct 29, 2022Updated 3 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆17Nov 20, 2017Updated 8 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆77Updated this week
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆37Aug 6, 2024Updated last year
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- CGen is a tool for encoding SHA-1 and SHA-256 hash functions into CNF in DIMACS format, also into ANF polynominal system in PolyBoRi outp…☆25Jun 3, 2023Updated 2 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Basic SPN cryptanalysis☆15Dec 1, 2021Updated 4 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 7 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- SAT instance generator for SHA-1☆49Feb 12, 2021Updated 5 years ago
- ☆11Aug 17, 2018Updated 7 years ago
- An experimental, FP&ECS-inspired MC:BE Server Software☆11Dec 14, 2022Updated 3 years ago
- Prince cipher source code in C99 and test vectors with intermediate values☆15May 22, 2021Updated 4 years ago