GeneralZero / ChaCha-and-SalsaLinks
A simple, commented and readable python implementation of ChaCha, Salsa, Poly1305, MD2, MD4, MD5, SHA1, SHA2, SHA3, Blake, Blake2, DES, 3DES, and more
☆10Updated last year
Alternatives and similar repositories for ChaCha-and-Salsa
Users that are interested in ChaCha-and-Salsa are comparing it to the libraries listed below
Sorting:
- attacking RSA via lattice reductions (LLL)☆810Updated 4 years ago
- Seed recovery tool for PRNGs☆381Updated 7 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆138Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,111Updated 3 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆215Updated 5 years ago
- ☆1,147Updated 8 months ago
- A Python interface for https://github.com/fplll/fplll☆149Updated 3 months ago
- Tips, Tricks, and Suggestions for Running a CTF☆394Updated 3 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆246Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆128Updated 5 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆97Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆36Updated 10 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆174Updated 5 years ago
- ☆94Updated 5 months ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆664Updated last year
- ☆15Updated 2 years ago
- Pure Python hash length extension module☆126Updated 2 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated 10 months ago
- ☆100Updated 9 years ago
- Practical Implementation of the Maurer Reduction☆10Updated 2 years ago
- ☆10Updated 3 years ago
- A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber☆265Updated 3 weeks ago
- A repository trying to collect things related to LLL☆71Updated last year
- ☆34Updated 2 years ago
- A list of the state of IETF protocols and PQC☆70Updated 3 months ago
- Coppersmith's method for multivariate polynomials☆185Updated last year
- ☆19Updated last month
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆854Updated last month