cr-marcstevens / sha1_gpu_nearcollisionattacksLinks
GPU code for the first SHA-1 collision attack and two freestart attacks
☆34Updated 3 years ago
Alternatives and similar repositories for sha1_gpu_nearcollisionattacks
Users that are interested in sha1_gpu_nearcollisionattacks are comparing it to the libraries listed below
Sorting:
- ☆11Updated 6 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 3 years ago
- White-box Analysis and Implementation Tools☆76Updated 3 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46Updated 6 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- ☆20Updated 5 years ago
- ☆15Updated 2 years ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- Conference Presentations☆45Updated 5 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆31Updated this week
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Updated 11 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- ☆42Updated 8 years ago
- ☆74Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- Check a Windows PE file for some basic security flags☆12Updated 10 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Docker files for Miasm☆17Updated 7 years ago