cryptolu / primes-backdoor
Prime backdooring procedure to allow fast factorization of semiprimes
☆21Updated 2 years ago
Related projects: ⓘ
- Some crypto scripts which is useful in study and ctf☆25Updated 3 years ago
- rkm0959 implements stuff☆40Updated last year
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- Complex multiplication based factorization☆35Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Repo for collecting part of my public CTF challenges☆37Updated 5 months ago
- CVP "trick" for CTF challenges☆121Updated last year
- Homemade implementation of Square Attack against 4 rounds AES☆13Updated 4 years ago
- ctfs-2020☆17Updated 4 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆60Updated 3 years ago
- Automated cryptanalysis of substitution permutation network cipher☆26Updated 3 weeks ago
- ☆62Updated 4 years ago
- A repository trying to collect things related to LLL☆69Updated last week
- Repo for storing CTF related stuff (Writeups, etc.)☆49Updated 8 months ago
- Representing DES in Z3☆15Updated last year
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Updated 4 years ago
- Implementation of the ROCA attack☆17Updated 3 years ago
- ☆12Updated 4 years ago
- My CTF challenges, especially cryptography☆22Updated 8 months ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆16Updated 3 years ago
- ☆25Updated 2 years ago
- ☆32Updated 2 years ago
- A Sage implementation of the ROCA attack☆20Updated last year
- Collections of all CTF challenges made by me.☆17Updated 5 months ago
- ☆37Updated last year
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆34Updated 4 years ago
- CTF problems I have created.☆12Updated last year
- Implementation of attacks on cryptosystems☆69Updated 3 years ago
- Cryptography & CTF Writeups☆82Updated last year