bozhu / IDEA-PythonLinks
A Python implementation of the block cipher IDEA
☆15Updated 7 years ago
Alternatives and similar repositories for IDEA-Python
Users that are interested in IDEA-Python are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆77Updated 3 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- Implementation of Trivium Stream Cipher in Python☆16Updated 7 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- A Sage implementation of the ROCA attack☆25Updated 2 years ago
- Differential fault analysis framework for AES128☆49Updated 12 years ago
- rkm0959 implements stuff☆45Updated 3 years ago
- Implementation of attacks on cryptosystems☆76Updated 3 months ago
- Complex multiplication based factorization☆40Updated 3 years ago
- Some crypto scripts which is useful in study and ctf☆29Updated 4 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 3 years ago
- ☆58Updated 5 years ago
- ☆67Updated 5 years ago
- Implementation of known practical attack on some AES variant☆15Updated last year
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆18Updated 7 years ago
- Cryptographic algorithm implementation☆50Updated 2 years ago
- ☆15Updated 5 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 3 years ago
- ☆11Updated 6 years ago
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Updated 5 years ago
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆41Updated 5 years ago
- ☆42Updated 8 years ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- IDEA cryptography algorithm☆10Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- ctfs-2020☆17Updated 5 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆33Updated 4 years ago
- SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA☆24Updated 12 years ago
- Tool for generating Elliptic curve domain parameters☆129Updated 6 months ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆84Updated 9 months ago