Merricx / aes-attackLinks
Implementation of known practical attack on some AES variant
☆15Updated last year
Alternatives and similar repositories for aes-attack
Users that are interested in aes-attack are comparing it to the libraries listed below
Sorting:
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 2 years ago
- Repo for collecting part of my public CTF challenges☆41Updated last year
- ☆23Updated last year
- Challenge source code and author write-ups for KalmarCTF☆65Updated 3 months ago
- Some crypto scripts which is useful in study and ctf☆29Updated 3 years ago
- ☆27Updated 3 years ago
- public archive for corCTF 2022☆35Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Updated 2 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆27Updated 3 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated last week
- ☆48Updated last week
- Challenge repository for ACSC 2024☆12Updated last year
- ☆15Updated 2 years ago
- Source code and solution of CTF challenges that I created.☆46Updated 3 weeks ago
- CVP "trick" for CTF challenges☆135Updated 2 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆18Updated 10 months ago
- CTF challenges I've written☆35Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆14Updated last year
- rkm0959 implements stuff☆45Updated 2 years ago
- ☆12Updated 5 years ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Implementation of attacks on cryptosystems☆74Updated 4 years ago
- A Sage implementation of the ROCA attack☆23Updated 2 years ago
- My CTF challenges, especially cryptography☆25Updated 4 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆17Updated 8 months ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 3 years ago
- ☆17Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 10 months ago
- Complex multiplication based factorization☆38Updated 3 years ago