Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View acad2's full-sized avatar

Block or report acad2

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Greek letters for enumerates in LaTeX (depends on the enumitem package)

TeX 5 Updated Nov 7, 2014

simavr is a lean, mean and hackable AVR simulator for linux & OSX

C 1,704 393 Updated Nov 2, 2025

Learning the Enigma with Recurrent Neural Networks

Jupyter Notebook 163 52 Updated Aug 11, 2022

Assembly Code Leakage Detection tool

Python 5 1 Updated May 10, 2017

C AES Implementation with mask countermeasure against power analysis attacks.

C 4 3 Updated Oct 15, 2019

An inner-product-masking based countermeasure for encrytion algorithms whose sboxes using GF multiplication (i.e. AES/SM4).

C 1 2 Updated May 26, 2017

MIPS64 assembly implementation of the New Hope KEM

Assembly 1 2 Updated Jan 15, 2018

Cryptography for FPGAs course (Radboud Universiteit Nijmegen - 2014/2016)

4 2 Updated Jan 28, 2022

ARM optimized bitsliced 2nd order masked implemenation of PRESENT block cipher

C 3 3 Updated Apr 25, 2018

This script generates and analyzes prefix tree adders.

Python 1 Updated Feb 25, 2018
SourcePawn 1 1 Updated Nov 24, 2016

Cryptanalysis of Physically Unclonable Functions

Python 88 30 Updated Jun 29, 2024

Trojan Attack on Neural Network

Python 188 38 Updated Mar 25, 2022

A Stealthy Trojan Spyware

C++ 1,114 271 Updated Oct 20, 2025

A Python API for the MiniSat and MiniCard constraint solvers.

C++ 22 7 Updated Jun 22, 2025

A benchmark library for constraints

Prolog 98 72 Updated Oct 29, 2025

GPU imlpementation of Pearson correlation

C 9 2 Updated Jun 18, 2025

A pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

Python 9,556 1,523 Updated Oct 30, 2025

Create 2D visuals in Python.

Python 80 20 Updated Dec 9, 2021

Utility to generate PGF vector files from Python's Matplotlib plots to use in LaTeX documents.

Python 70 8 Updated Mar 15, 2023

A Python library for creating LaTeX files

Python 2,347 299 Updated Jul 25, 2024

Brute-force search algorithm for Bitslice DES S-box functions with Nvidia Maxwell LOP3.LUT instructions written in C#

C# 2 4 Updated Jul 20, 2015

Bitslice DES S-boxes with LOP3.LUT instructions for NVIDIA Maxwell architecture

C 5 4 Updated Feb 28, 2016

Performs key-recovery attacks on the SoDark family of algorithms.

C 8 4 Updated Nov 30, 2021

An open-source library supporting simulation and cryptanalysis of stream ciphers based on linear feedback shift registers (LFSRs).

Java 1 Updated May 4, 2018

Program for finding low gate count implementations of S-boxes.

C 40 18 Updated Oct 22, 2024

Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…

Python 1,590 263 Updated Jun 19, 2021

An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.

Python 1 Updated Oct 18, 2017
Next