Skip to content
@Simula-UiB

Simula UiB

Simula UiB research lab

Popular repositories

  1. CryptaPath CryptaPath Public

    A tool for evaluating strength against algebraic cryptanalysis

    Rust 5 4

  2. mesh-node mesh-node Public

    C 3

  3. LGM-attack LGM-attack Public

    C-code implementing an attack on the LGM FHE scheme

    C 2

  4. CRHS CRHS Public

    Home of CryptaPath and PathFinder: Tools for algebraic cryptanalysis using CRHS (BDDs).

    Rust 2 1

  5. bitsliced-aes-cpa bitsliced-aes-cpa Public

    Assembly 2

  6. RubatoAttack RubatoAttack Public

    Code for testing attack on Rubato with weak values of q

    C 1

Repositories

Showing 10 of 13 repositories
  • 0 0 0 0 Updated Apr 26, 2024
  • Algebraic-Attack-on-RSD Public

    Simple scripts in Magma for finding optimal parameters for the algebraic attack on RSD

    0 MIT 0 0 0 Updated Feb 18, 2024
  • CGI-DPA Public

    Codebase for the experiments performed in the paper "Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference"

    Python 0 0 0 0 Updated Jul 22, 2023
  • RubatoAttack Public

    Code for testing attack on Rubato with weak values of q

    C 1 MIT 0 0 0 Updated Jan 17, 2023
  • GAUP_TIFS22 Public

    Code for journal paper "Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval," to appear in IEEE Transactions on Information Forensics and Security

    Python 0 1 0 0 Updated Sep 28, 2022
  • LGM-attack Public

    C-code implementing an attack on the LGM FHE scheme

    C 2 MIT 0 0 0 Updated Aug 8, 2022
  • CRHS Public

    Home of CryptaPath and PathFinder: Tools for algebraic cryptanalysis using CRHS (BDDs).

    Rust 2 MIT 1 0 0 Updated Jun 28, 2022
  • Assembly 2 0 0 0 Updated Jun 1, 2022
  • Fasta Public

    Code for timing run times of Fasta and Rasta in HElib

    C++ 0 MIT 1 0 0 Updated Jan 28, 2022
  • Attack-On-The-Dob-Encryption-Scheme Public

    Contains Magma scripts for generating the public key of the Dob encryption scheme, as well as an implementation of the attack on this construction.

    0 MIT 0 0 0 Updated Dec 15, 2021

Top languages

Loading…

Most used topics

Loading…