dmatlack / cuda-rsa
pollard's p-1 algorithm on CUDA
☆24Updated 10 years ago
Related projects: ⓘ
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆62Updated 6 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Updated 9 years ago
- Haraka is a secure and efficient short-input hash function.☆50Updated 6 years ago
- An optimized sample code for SHA256 and SHA512 using C intrinsic☆16Updated 4 years ago
- Solve discrete logarithm problems by the number field sieve method.☆16Updated 7 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆17Updated 5 months ago
- Implementation of Elliptic Curve Cryptography in C++☆41Updated 9 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆41Updated 3 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- ☆20Updated this week
- Tool for computing elliptic curve (EC) discrete logarithms☆34Updated 7 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆14Updated 3 months ago
- ☆22Updated this week
- A bitsliced implementation of ECB and CTR AES☆46Updated last month
- A lookup table for the discrete log in secp265k1☆20Updated 3 years ago
- SSE optimized version of SHA256, doing four blocks in parallel☆22Updated 13 years ago
- Simple ChaCha20Poly1305@Bitcoin C implementation☆30Updated 5 years ago
- Simple tool to calculate sha256 on GPU using Cuda☆83Updated last month
- AVX2 Chacha implementation☆16Updated 10 years ago
- ☆42Updated this week
- Optimized Binary GCD for Modular Inversion☆42Updated 3 years ago
- ☆19Updated this week
- Implementation of cryptographic program obfuscation☆41Updated 6 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆37Updated last month
- A statically allocated big integer library, designed to execute on GPU's and CPU's.☆19Updated 6 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆11Updated 9 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- measure entropy of memory allocators☆12Updated 2 years ago
- Lightweight cryptographic hash functions (reference code)☆15Updated 10 years ago