Shibam Ghosh's starred repositories
bitcoinbook
Mastering Bitcoin 3rd Edition - Programming the Open Blockchain
ethereumbook
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
Self-learning-Computer-Science
the resources I use to learn computer science in my spare time
Web3-Security-Library
Information about web3 security and programming tutorials/tools
Please-Contain-Yourself
A Docker tutorial written for people who don't actually know Docker already.
lineartrails
Tool to automatically search for linear characteristics
NSA-ciphers
SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA
sboxanalyzer
An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes
MILP-basedModel
MILP-based Differential Attack on Round-Reduced GIFT
MonomialPrediction
Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums" accepted by ASIACRYPT 2020
cas-symmetric-Q-lecture
A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences
keccak-milp
An experiment with the the Mixed Integer Linear Programming (MILP) Model for Keccak-p[400]
DegreeEvaluationByDivisionProperty
The source code to evaluate the upper bound on degree of Trivium, Kreyvium, Keccak permuation and KNOT permutation using two-subset division property. For more details, one can refer to the paper "on the relationships between different methods for degree evaluation".
MILP_conditional_cube_attack
Materials of "Improved Conditional Cube Attacks on Keccak Key Modes with MILP Method".
massive_superpoly_recovery
The codes and recovered superpolies for the paper "Massive Superpoly Recovery with Nested Monomial Predictions"
cryptosmt-boomerang
New module for the CryptoSMT tool (https://github.com/kste/cryptosmt) to support automatic boomerang search.
Cryptography_StreamCiphers
Implementation of Trivium Stream Cipher and its comparison with a simple LFSR, Learning about its immunity to linear span attacks and the Berlekamp-Massey Algorithm. Using standard cryptanalysis techniques to understand Non-linear LFSR like trivium
cube-attack
simulation of a cryptographic cube attack
6th-round-reduced-aes-attack
The Partial Sum Attack on 6-round reduced AES