capiman / sha256-sat-bitcoinLinks
SHA256-SAT-BITCOIN
☆24Updated 9 years ago
Alternatives and similar repositories for sha256-sat-bitcoin
Users that are interested in sha256-sat-bitcoin are comparing it to the libraries listed below
Sorting:
- Introduction to Secure Multi-Party Computations☆16Updated 6 years ago
- SAT-based Bitcoin Mining☆88Updated 3 years ago
- Material for PARI/GP: new functions, some scripts, and syntax highlighting.☆11Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 7 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- ☆12Updated 5 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- A memory-hard password hashing function.☆70Updated 2 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Solve discrete logarithm problems by the number field sieve method.☆18Updated 8 years ago
- Implementation of Kravatte Encryption Suite☆15Updated 6 years ago
- A malicious cryptocurrency☆51Updated 9 years ago
- Bounds on divsteps iterations in safegcd☆53Updated 11 months ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- SAT instance generator for SHA-1☆49Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆63Updated 10 years ago
- Python module for sending bitcoin transaction directly to the bitcoin network☆14Updated 13 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Updated 10 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Updated 11 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆68Updated 2 years ago
- How Jason Bourne Stores His Bitcoin in 2021☆15Updated 3 years ago
- ☆24Updated 3 years ago
- Reference implementations of the GIMLI permutation☆15Updated 8 years ago