☆89Feb 17, 2016Updated 10 years ago
Alternatives and similar repositories for million-dollar-curve
Users that are interested in million-dollar-curve are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Library for reading and writing dex files☆26Mar 14, 2026Updated last week
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Apr 28, 2022Updated 3 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- Template for use Kotlin, Moxy, RxJava2, Retrofit, Dagger2, Timber, EventBus☆12Jul 31, 2017Updated 8 years ago
- The main program for PIXEL: LED ART which runs animated gifs☆17Oct 15, 2023Updated 2 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- CoRIM and CoMID manipulation library☆22Mar 9, 2026Updated 2 weeks ago
- Authenticated encryption scheme prover/synthesizer☆16Aug 25, 2022Updated 3 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Sep 11, 2017Updated 8 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆48Updated this week
- Scripts and images for MicroG+LineageOS 16.0 on OnePlus 5T with a locked bootloader.☆16Dec 19, 2019Updated 6 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- CryptoBib Database for Developers☆45Updated this week
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 3 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- ☆82Apr 18, 2020Updated 5 years ago
- Multi-input functional encryption☆12Feb 8, 2018Updated 8 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago