Chair-for-Security-Engineering / ecmongpuLinks
ECM Factorization on CUDA-GPUs
☆13Updated 4 years ago
Alternatives and similar repositories for ecmongpu
Users that are interested in ecmongpu are comparing it to the libraries listed below
Sorting:
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆39Updated last year
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆28Updated 3 years ago
- Breakthrough AES Performance on CUDA Devices☆38Updated 3 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆32Updated last year
- Differential Address Trace Analysis☆57Updated last year
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Scone Website☆11Updated last week
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- ☆16Updated 3 years ago
- ☆23Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆39Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated last year
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Updated 11 months ago
- An Implementation of the Number Theoretic Transform☆47Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated 2 months ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆32Updated 2 months ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- MAYO C implementation☆16Updated 2 months ago
- ☆20Updated 5 years ago
- An efficient lattice-based cryptographic hash function☆26Updated 8 years ago