cryptosubtlety / final-security-bug
Google Tink's critical Ed25519 bug related to Java "final" keyword
☆11Updated 4 years ago
Related projects: ⓘ
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆12Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆14Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 3 years ago
- Proof of Device☆20Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Code for the tutorial on how to poc bug leads on Immunefi using foundry☆11Updated 2 years ago
- Joint effort with Matter Labs (https://matter-labs.io/) to make a ZK-friendly hash accumulator☆12Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆25Updated 8 months ago
- ☆17Updated 4 years ago
- Homomorphic Encryption Randomness Beacon☆13Updated 4 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated 4 months ago
- ☆19Updated 4 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 4 years ago
- Differential fuzzing for elliptic curves☆22Updated last year
- Script(s) to interact with gp-v2-contracs☆11Updated 2 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 5 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆18Updated 4 years ago
- Easily attest to and read attestations on the Bloom protocol☆16Updated 3 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆29Updated last year
- A library for decentralized private computation☆18Updated 3 years ago
- ☆9Updated last year
- Blockchain Challs from HACON2020 CTF☆13Updated 2 years ago
- ☆14Updated 5 years ago
- Prototype of fraud proofs.☆12Updated 2 years ago