david-r-cox / pyDLPLinks
Python implementation of the index calculus method for solving discrete logarithm problems
☆26Updated 5 years ago
Alternatives and similar repositories for pyDLP
Users that are interested in pyDLP are comparing it to the libraries listed below
Sorting:
- Implements Coron's simplification of Coppersmith's algorithm☆43Updated 2 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆83Updated last year
- ☆12Updated 6 years ago
- Tool for generating Elliptic curve domain parameters☆131Updated 2 months ago
- A Sage implementation of the ROCA attack☆27Updated 2 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Updated 8 years ago
- ☆20Updated 6 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Updated 3 years ago
- ☆68Updated 5 years ago
- Implementation of attacks on cryptosystems☆75Updated 6 months ago
- Python code to implement various number theory, elliptic curve and finite field computations.☆103Updated 4 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- Implementation of the ROCA attack☆17Updated 5 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- C++ STL for speed and cryptanalytic application☆11Updated last month
- Solve discrete logarithm problems by the index calculus method.☆17Updated 8 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated 2 months ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36Updated 3 years ago
- White-box Analysis and Implementation Tools☆78Updated 4 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated last year
- White-box cryptography based on FAPKC algorithm☆28Updated last month
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Updated last year
- ☆15Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆41Updated 8 months ago
- ☆42Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 10 years ago