Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
☆33Jun 6, 2022Updated 3 years ago
Alternatives and similar repositories for minerva
Users that are interested in minerva are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- A GPU orchestraded BIP39 mnemonic solver for BTC blockchain☆12Jul 26, 2022Updated 3 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- ☆34May 20, 2021Updated 4 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- ☆20Apr 3, 2021Updated 5 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆61Oct 4, 2019Updated 6 years ago
- Breaking ECDSA (not so broken) with LLL☆92Mar 26, 2026Updated last month
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BTCRelay re-implementation in Solidity☆26Apr 13, 2026Updated 3 weeks ago
- ☆12Feb 18, 2024Updated 2 years ago
- Find PrivateKey of corresponding Pubkey(s) using Pollard Kangaroo algo☆81Jul 3, 2022Updated 3 years ago
- Brute force Bitcoin private keys.☆23May 7, 2023Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆64Mar 8, 2026Updated last month
- JavaCard project template for building CAP and running JCardSim with gradle + coverage☆19Mar 24, 2024Updated 2 years ago
- ☆28Jul 10, 2024Updated last year
- Many proofs of the Pythagoras theorem - Lean 4☆10Dec 1, 2023Updated 2 years ago
- A fuzzer for APDU-based smartcard interfaces☆21Mar 16, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Reads EMV cards, extract public keys, checks them for ROCA vulnerability (https://crocs.fi.muni.cz/public/papers/rsa_ccs17). Uses code fr…☆26Nov 19, 2017Updated 8 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- Implementation of precomputed PSI for smartphone☆12Oct 12, 2017Updated 8 years ago
- Kangaroo cuda solver for SECP256K1☆30Oct 30, 2025Updated 6 months ago
- Python Library for Secp256k1 Bitcoin curve to do fast ECC calculation☆159Feb 22, 2025Updated last year
- Blockthon Python Package for Generate and Converting Wallet Private Key and Mnemonic for Address Bitcoin☆28Mar 7, 2024Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆47Nov 24, 2025Updated 5 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.☆128Feb 4, 2025Updated last year
- Practical Implementation of the Maurer Reduction☆11Jul 13, 2023Updated 2 years ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆25Jul 29, 2020Updated 5 years ago
- Egy-Crack Ethereum PrivateKey (Generator-Cracker)☆32May 10, 2024Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- javascript ecdsa generator, specifically secp256k1 properties, using jordon form matrices☆29Nov 18, 2024Updated last year