Sc00bz / break-uheprng
Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)
☆11Updated 7 years ago
Alternatives and similar repositories for break-uheprng
Users that are interested in break-uheprng are comparing it to the libraries listed below
Sorting:
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- ☆12Updated 5 years ago
- Communicate undetected in plain sight using zero width obfuscation.☆15Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- betrusted.io main SoC design☆12Updated 5 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- A tiny library to properly encrypt IP addresses.☆17Updated 2 weeks ago
- A tweakable block cipher☆31Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated last month
- Python bindings for Monocypher crypto library.☆16Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- ☆11Updated 4 years ago
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)☆18Updated 3 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- ☆81Updated 5 years ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆25Updated 2 years ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆18Updated 5 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated last month
- executing JS from x86 code☆27Updated 6 years ago
- Slides from Public Talks☆18Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 9 months ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago