capiman / sha256-sat-bitcoinLinks
SHA256-SAT-BITCOIN
☆24Updated 9 years ago
Alternatives and similar repositories for sha256-sat-bitcoin
Users that are interested in sha256-sat-bitcoin are comparing it to the libraries listed below
Sorting:
- Material for PARI/GP: new functions, some scripts, and syntax highlighting.☆11Updated 2 years ago
- Convert an integer factorization problem into a boolean SATISFIABILITY problem.☆10Updated 7 years ago
- SAT-based Bitcoin Mining☆89Updated 4 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- ☆12Updated 5 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Updated 8 years ago
- Grain of Salt equation generator☆16Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- General number field sieve for python☆18Updated 10 years ago
- Tool to automatically search for linear characteristics☆39Updated 10 years ago
- SAT instance generator for SHA-1☆49Updated 4 years ago
- Introduction to Secure Multi-Party Computations☆16Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆70Updated 3 years ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- ECM Factorization on CUDA-GPUs☆14Updated 5 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Updated 6 months ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- distributed.net client public source code. (Note: this codebase does not have networking or buffer file capabilities)☆48Updated last year
- SHA-3 finalist (reference code)☆41Updated 11 years ago
- Lattice algorithms using floating-point arithmetic☆392Updated 3 months ago
- Test for randomness in data.☆21Updated 3 years ago
- Finite field math in python including generic matrix operations and Reed-Solomon error correcting codes.☆67Updated 3 years ago