Software and other Implementations
Table of Contents
Work in progress
1 Cryptanalysis
1.1 Attacks Against Spook and Shadow
With a team of researchers from Inria, Loria and Irisa, we found some attacks against a round 2 NIST lightweight candidate, Spook, and the permutation Shadow that it uses. More details are given here, including our implementation of the attacks.
2 S-box Analysis
2.1 sboxU
In order to study S-boxes, I have developed my own tool-box called
sboxU
. More information here.