dmatlack / cuda-rsaLinks
pollard's p-1 algorithm on CUDA
☆28Updated 11 years ago
Alternatives and similar repositories for cuda-rsa
Users that are interested in cuda-rsa are comparing it to the libraries listed below
Sorting:
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Updated 10 years ago
- Solve discrete logarithm problems by the number field sieve method.☆18Updated 8 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- C++ STL for speed and cryptanalytic application☆11Updated 3 weeks ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆34Updated 3 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆84Updated 8 months ago
- Bloom filter implementation☆39Updated 2 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Updated 2 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆29Updated 3 years ago
- Small, fast, header only, zero dependency cryptographic library.☆24Updated 2 years ago
- Shor's algorithm simulation using CUDA☆19Updated 5 years ago
- Simple tool to calculate sha256 on GPU using Cuda☆98Updated last year
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- ☆12Updated 5 years ago
- QARMA block cipher in C☆30Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Updated last year
- White-box cryptography based on FAPKC algorithm☆28Updated 7 months ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Updated 6 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆101Updated 8 years ago
- Highly efficient implementation of elliptic curve 25519☆156Updated 2 years ago
- Implementation of Elliptic Curve Cryptography in C++☆43Updated 10 years ago
- NVidia sass disassembler/inline patcher☆28Updated this week
- A minimalist implementation of AES algorithms in C☆56Updated last month
- ☆111Updated 2 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- immintrin_dbg.h is an include file, a wrapper around immintrin.h. It implements most of AVX, AVX2, AVX-512 vector intrinsics to enable so…☆57Updated 2 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 4 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A fast implementation for parallel processing single block SHA256.☆15Updated 8 years ago