Python code to implement various number theory, elliptic curve and finite field computations.
☆104Oct 13, 2021Updated 4 years ago
Alternatives and similar repositories for Number-Theory-Python
Users that are interested in Number-Theory-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 4 months ago
- A Haskell number theory library.☆15Jul 3, 2017Updated 8 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 4 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Nov 25, 2024Updated last year
- Tools for btc hacking☆15Feb 21, 2021Updated 5 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Breaking ECDSA (not so broken) with LLL☆92Mar 26, 2026Updated last month
- A pairing library of elliptic curve☆60Mar 4, 2024Updated 2 years ago
- Python library for fast elliptic curve crypto☆288Apr 3, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Sep 23, 2021Updated 4 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆20Apr 3, 2021Updated 5 years ago
- ☆68Apr 13, 2020Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MpcLib - A Multi-Party Computation Library☆16Jun 5, 2016Updated 9 years ago
- Exploration of primes, factorization and number theory through haskell☆10Oct 10, 2016Updated 9 years ago
- Spaceman Game base deployment☆12Sep 30, 2019Updated 6 years ago
- Universal errors-and-erasures Reed Solomon codec (error correcting code) in pure Python with extensive documentation☆29May 7, 2023Updated 3 years ago
- vIPer: a new tool for IPython notebooks.☆60Jan 7, 2015Updated 11 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆33Nov 13, 2025Updated 5 months ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 5 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆52Aug 5, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Atomic swap proof of concept code☆17Jul 22, 2019Updated 6 years ago
- Aidos Kuneen Full Node☆12Aug 18, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Standard curve database.☆126Apr 2, 2026Updated last month
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆254Jul 6, 2023Updated 2 years ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago