Skip to content
View meichunjia's full-sized avatar

Highlights

  • Pro

Block or report meichunjia

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Implementation of attacks on cryptosystems

Python 76 14 Updated Jul 29, 2025

A repository that aims to provide tools for cryptography and cryptanalysis

HTML 215 52 Updated Jun 24, 2020

MILP Model for Paper "Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool"

C++ 3 Updated Feb 9, 2025

Tool for Modeling Large S-box in MILP Based Differential Characteristics Search

JavaScript 8 1 Updated Sep 16, 2021

Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect

C++ 3 1 Updated Jul 31, 2020

SMT models for finding quasidifferential trails in RECTANGLE, KNOT, Speck and Simon.

Python 7 1 Updated Jan 26, 2024

Tools for studying S-boxes

Python 2 Updated Oct 27, 2025

Numerical optimization code for classical and quantum subset-sum algorithms

Python 10 Updated Feb 14, 2020

This code is accompanying the articles "On boomerang attacks on quadratic Feistel ciphers" and "On impossible boomerang attacks".

Python 3 Updated Jun 13, 2025

Dynamic Programming, MILP, Depth First Search and Greedy Algorithms

Jupyter Notebook 2 Updated Dec 15, 2023

Solving the kidney exchange problem using Integer Linear Programming with a greedy heuristic

Python 4 2 Updated Jan 13, 2019

Three Algorithms to solve MaxCut: an optimal solver via Integer Linear Programming with Gurobi, an approximative greedy solver and an approximative random greedy solver

C++ 5 3 Updated Nov 12, 2018

A Differentially Private Decision Forest using greedy splitting heuristics

Python 1 2 Updated Apr 30, 2017

Archive of Potential Insider Threats

151 22 Updated Sep 25, 2023

LeetCode Problems' Solutions

Go 293 130 Updated Feb 16, 2022

🎬 人人影视 机器人和网站,包含人人影视全部资源以及众多网友的网盘分享

Python 15,751 1,868 Updated Nov 3, 2025

百度网盘超级会员,迅雷会员、爱奇艺会员账号每日分享,还有优酷,腾讯,芒果等VIP。AND。百度网盘(百度云)不限速工具分享。

2,843 236 Updated Aug 18, 2020

The accompanying code for the article "A cautionary note on the use of Gurobi for cryptanalysis".

Python 10 3 Updated Sep 15, 2020

Materials of "Improved Conditional Cube Attacks on Keccak Key Modes with MILP Method".

C++ 6 6 Updated Jul 15, 2017

An open-source Java library for Constraint Programming

Java 736 149 Updated Nov 3, 2025

Cryptanalysis code for the SIMON and SPECK families of block ciphers

C++ 20 12 Updated Feb 5, 2016

Haraka is a secure and efficient short-input hash function.

C 58 9 Updated Sep 26, 2017

Tool to automatically search for linear characteristics

C++ 39 12 Updated Jan 27, 2016

Bachelor thesis "Using SAT Solvers to detect Contradictions in Differential Characteristics"

TeX 3 1 Updated Aug 10, 2015

Simple Theorem Prover.

C++ 1 Updated Dec 17, 2014

Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.

Objective-C 9 6 Updated Apr 22, 2018

Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.

Objective-C 2 1 Updated Apr 22, 2018

A practical preimage attack on 3-round Keccak-224

C++ 1 Updated Mar 18, 2019

Demonstrate all the questions on LeetCode in the form of animation.(用动画的形式呈现解LeetCode题目的思路)

Java 2 2 Updated Sep 16, 2019
Next