MEGA-Awry / attacks-poc
PoC for our attacks on MEGA.
☆27Updated 2 years ago
Alternatives and similar repositories for attacks-poc
Users that are interested in attacks-poc are comparing it to the libraries listed below
Sorting:
- A Tamarin model and analysis of EMV☆31Updated 4 years ago
- ☆26Updated 4 years ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Simple attacks on AES-ECB☆20Updated 4 years ago
- Challenge archive☆23Updated last month
- Toolkit for creating cryptographic figures and videos.☆32Updated last year
- Typora theme based on the CryptoHack blog☆32Updated 4 years ago
- Solutions to https://cryptopals.com problems☆28Updated 3 weeks ago
- ☆112Updated last year
- Some writeups for some CTFs☆17Updated last year
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- ☆17Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- A Sage implementation of the ROCA attack☆22Updated 2 years ago
- Implementation of known practical attack on some AES variant☆14Updated last year
- Slides from our technical talks☆29Updated 6 months ago
- Complex multiplication based factorization☆38Updated 3 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆129Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆82Updated 3 years ago
- TrustZone Trusted Application 0-Days by Design☆19Updated last week
- ☆18Updated 11 months ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- ☆47Updated 2 years ago
- ☆71Updated 5 years ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆82Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆80Updated 4 years ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated last year
- ☆45Updated 2 weeks ago