MEGA-Awry / attacks-poc
PoC for our attacks on MEGA.
☆26Updated 2 years ago
Alternatives and similar repositories for attacks-poc:
Users that are interested in attacks-poc are comparing it to the libraries listed below
- Toolkit for creating cryptographic figures and videos.☆30Updated 8 months ago
- Typora theme based on the CryptoHack blog☆32Updated 3 years ago
- ☆25Updated 3 years ago
- SMT based attacks on non cryptographic PRNGs☆79Updated last year
- Simple attacks on AES-ECB☆16Updated 4 years ago
- Complex multiplication based factorization☆35Updated 2 years ago
- Slides from our technical talks☆28Updated 2 months ago
- A Tamarin model and analysis of EMV☆29Updated 3 years ago
- A Sage implementation of the ROCA attack☆23Updated last year
- Some writeups for some CTFs☆16Updated 9 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆124Updated last year
- Bleichenbachers "Million message attack" on RSA in Python☆27Updated 3 years ago
- Proof-of-concept for Spook.js☆69Updated 3 years ago
- A tool to perform so called BGE attack☆22Updated 9 months ago
- Infer internal state of Mersenne Twister from truncated output☆72Updated 2 years ago
- Personal challenge archive☆20Updated 7 months ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- Checks for tpm vulnerabilities☆36Updated last year
- White-box Design and Analysis kit☆22Updated last year
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆41Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated last month
- Homemade implementation of Square Attack against 4 rounds AES☆14Updated 4 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆29Updated 2 months ago
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 4 months ago
- ☆41Updated 3 weeks ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 2 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago