GeneralZero / ChaCha-and-SalsaLinks
A simple, commented and readable python implementation of ChaCha, Salsa, Poly1305, MD2, MD4, MD5, SHA1, SHA2, SHA3, Blake, Blake2, DES, 3DES, and more
☆10Updated last year
Alternatives and similar repositories for ChaCha-and-Salsa
Users that are interested in ChaCha-and-Salsa are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆364Updated 5 months ago
- Bleichenbacher's PKCS 1.5 Padding Oracle Attack.☆16Updated 4 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,115Updated 4 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Updated 5 years ago
- attacking RSA via lattice reductions (LLL)☆824Updated 4 years ago
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆176Updated 5 years ago
- ☆12Updated 3 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,590Updated 4 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆395Updated 3 years ago
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Guidelines for low-level cryptography software☆1,183Updated 2 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆666Updated last year
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆863Updated 2 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆100Updated 2 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Updated 2 years ago
- Software of the NIST Post-Quantum submission NewHope☆45Updated 5 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆38Updated last year
- Factoring as a Service☆273Updated 5 months ago
- Solutions to Matasano crypto challenges in Python 3.☆108Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆136Updated 2 years ago
- ☆1,164Updated 10 months ago
- ☆237Updated 11 months ago
- [DEPRECATED — See notice in README.md and switch to OpenSSL 3 OQS Provider] Fork of OpenSSL 1.1.1 that includes prototype quantum-resista…☆309Updated 11 months ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆140Updated last year
- Security, hacking conferences (list)☆546Updated last week
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆34Updated last year