boppreh / aesLinks
A pure Python implementation of AES, with optional CBC, PCBC, CFB, OFB and CTR cipher modes.
☆194Updated 9 months ago
Alternatives and similar repositories for aes
Users that are interested in aes are comparing it to the libraries listed below
Sorting:
- A pure Python implementation of AES☆201Updated 4 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆133Updated last year
- A toolkit for cryptanalysis using lattices.☆122Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆82Updated 4 years ago
- A tiny ellliptic curve library☆79Updated last year
- ☆45Updated 3 weeks ago
- ☆31Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆240Updated last year
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆84Updated 10 months ago
- Coppersmith's method for multivariate polynomials☆165Updated last year
- Solution for cryptohack challenges☆21Updated 3 years ago
- Functions for solving linear inequalities in integers☆47Updated 2 months ago
- A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber☆255Updated 3 months ago
- Python library for fast elliptic curve crypto☆277Updated 4 months ago
- ☆63Updated last month
- Pure-Python implementation of AES block-cipher and common modes of operation.☆465Updated last year
- Some writeups for some CTFs☆17Updated last year
- Predict python's random module generated values.☆410Updated 6 months ago
- Cracking V8 Math.random() from arbitrary bit leaks☆17Updated last year
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆95Updated 2 months ago
- Solving linear systems over GF(2) by manipulating bitvectors☆42Updated 2 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆116Updated 4 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆104Updated 5 months ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆137Updated 3 months ago
- ☆21Updated 3 months ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 9 months ago
- A pure python tool to implement/exploit the hash length extension attack☆33Updated last year
- A Python interface for https://github.com/fplll/fplll☆137Updated last week
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆10Updated last year