Chair-for-Security-Engineering / ecmongpuLinks
ECM Factorization on CUDA-GPUs
☆14Updated 5 years ago
Alternatives and similar repositories for ecmongpu
Users that are interested in ecmongpu are comparing it to the libraries listed below
Sorting:
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- A repository of tools for verifying constant-timeness☆19Updated this week
- Repository for the current status of the LESS submission☆14Updated this week
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- Differential Address Trace Analysis☆63Updated last year
- Breakthrough AES Performance on CUDA Devices☆51Updated 11 months ago
- Program for finding low gate count implementations of S-boxes.☆41Updated last year
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆32Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Updated 2 years ago
- ☆24Updated 3 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆41Updated 10 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- ☆186Updated 5 years ago
- C++ STL for speed and cryptanalytic application☆11Updated last month
- CUDA accelerated(X) Multi-Precision library☆93Updated 9 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 4 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated 2 months ago
- QARMA block cipher in C☆31Updated 3 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆31Updated 7 months ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Updated 7 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Updated 2 months ago
- ☆26Updated 2 years ago
- Implementation of the fastest ISD algorithms☆23Updated 11 months ago