anneouyang / MT19937
Implementing and breaking the MT19937 Mersenne Twister pseudorandom number generator
☆25Updated 4 years ago
Alternatives and similar repositories for MT19937:
Users that are interested in MT19937 are comparing it to the libraries listed below
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- ☆34Updated last year
- An implementation of Dumer's algorithm for Information Set Decoding.☆13Updated last year
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆42Updated 5 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆24Updated 4 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆28Updated 2 years ago
- Imported from svn://scm.gforge.inria.fr/svnroot/ecm/☆23Updated last year
- ☆34Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆113Updated 2 months ago
- Bosphorus, ANF simplifier and solver, and ANF-to-CNF converter☆68Updated 3 months ago
- Solve discrete logarithm problems by the number field sieve method.☆17Updated 7 years ago
- SMT based attacks on non cryptographic PRNGs☆77Updated last year
- Solve discrete logarithm problems by the index calculus method.☆14Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- Is SIKE broken yet?☆17Updated 2 years ago
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆25Updated 10 months ago
- Infer internal state of Mersenne Twister from truncated output☆72Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆60Updated 7 months ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆22Updated 3 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆24Updated 4 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 9 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆16Updated 3 weeks ago
- Official SQIsign code, version under continuous development☆20Updated this week
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated 2 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆15Updated 8 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆15Updated 9 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆73Updated 3 years ago
- Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.☆28Updated 6 months ago