vvasseur / isd
An implementation of Dumer's algorithm for Information Set Decoding.
☆12Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for isd
- Implementation of the fastest ISD algorithms☆18Updated 2 weeks ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆26Updated 2 months ago
- ☆31Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 8 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆11Updated last year
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆34Updated this week
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 4 years ago
- rkm0959 implements stuff☆43Updated 2 years ago
- ☆13Updated 3 years ago
- Automated cryptanalysis of substitution permutation network cipher☆27Updated 2 months ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 4 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆25Updated 2 weeks ago
- Tool for generating Elliptic curve domain parameters☆109Updated 10 months ago
- ☆34Updated 2 years ago
- z3++☆24Updated 11 months ago
- White-box Design and Analysis kit☆22Updated last year
- CVP "trick" for CTF challenges☆123Updated last year
- ☆14Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆52Updated 7 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆14Updated 4 years ago
- SMT based attacks on non cryptographic PRNGs☆77Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Representing DES in Z3☆15Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆41Updated last year
- ☆35Updated last month