vvasseur / isd
An implementation of Dumer's algorithm for Information Set Decoding.
☆13Updated last year
Alternatives and similar repositories for isd:
Users that are interested in isd are comparing it to the libraries listed below
- Implementation of the fastest ISD algorithms☆19Updated 3 months ago
- C++ STL for speed and cryptanalytic application☆10Updated this week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆27Updated last week
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 11 months ago
- ☆34Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 5 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- ☆13Updated 3 years ago
- A Sage interface for FGb (Gröbner basis computations)☆34Updated 9 months ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆13Updated last year
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆27Updated 3 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 4 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆59Updated 7 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆40Updated this week
- SMT based attacks on non cryptographic PRNGs☆77Updated last year
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- ☆18Updated 3 months ago
- Solve discrete logarithm problems by the index calculus method.☆14Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆41Updated 4 years ago
- ☆34Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 5 months ago
- rkm0959 implements stuff☆43Updated 2 years ago
- The General Sieve Kernel☆105Updated 2 months ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- ☆19Updated 6 years ago