Simula UiB (Simula-UiB)

Simula UiB

Simula-UiB

Geek Repo

Simula UiB research lab

Location:Bergen, Norway

Github PK Tool:Github PK Tool

Simula UiB's repositories

CryptaPath

A tool for evaluating strength against algebraic cryptanalysis

Language:RustLicense:MITStargazers:5Issues:3Issues:0
Language:CLicense:Apache-2.0Stargazers:3Issues:4Issues:14
Language:AssemblyLicense:NOASSERTIONStargazers:2Issues:2Issues:0

CRHS

Home of CryptaPath and PathFinder: Tools for algebraic cryptanalysis using CRHS (BDDs).

Language:RustLicense:MITStargazers:2Issues:3Issues:0

LGM-attack

C-code implementing an attack on the LGM FHE scheme

Language:CLicense:MITStargazers:2Issues:3Issues:0

RubatoAttack

Code for testing attack on Rubato with weak values of q

Language:CLicense:MITStargazers:1Issues:2Issues:0

Algebraic-Attack-on-RSD

Simple scripts in Magma for finding optimal parameters for the algebraic attack on RSD

License:MITStargazers:0Issues:0Issues:0

Attack-On-The-Dob-Encryption-Scheme

Contains Magma scripts for generating the public key of the Dob encryption scheme, as well as an implementation of the attack on this construction.

License:MITStargazers:0Issues:1Issues:0

CGI-DPA

Codebase for the experiments performed in the paper "Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference"

Language:PythonLicense:NOASSERTIONStargazers:0Issues:1Issues:0

Fasta

Code for timing run times of Fasta and Rasta in HElib

Language:C++License:MITStargazers:0Issues:2Issues:0

GAUP_TIFS22

Code for journal paper "Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval," to appear in IEEE Transactions on Information Forensics and Security

Language:PythonStargazers:0Issues:3Issues:0

Redundant-Code-based-Masking

Source codes and experimental data for the TCHES paper "Redundant Code-based Masking Revisited"

Language:PythonLicense:MITStargazers:0Issues:1Issues:0
Stargazers:0Issues:0Issues:0