dmhacker / dual-ec-drbgLinks
Interactive proof-of-concept of the Dual_EC_DRBG backdoor
☆14Updated 2 years ago
Alternatives and similar repositories for dual-ec-drbg
Users that are interested in dual-ec-drbg are comparing it to the libraries listed below
Sorting:
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- A tweakable block cipher☆31Updated last year
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- Elliptic curves Rust reference implementation☆16Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Crypto library☆60Updated last week
- List of crackpot 'scientists' and 'thinkers'☆19Updated last week
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A tiny library to properly encrypt IP addresses.☆17Updated 2 weeks ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- A programming language to write bitsliced ciphers☆56Updated 9 months ago
- ☆19Updated 4 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- A collection of high-performance crypto implementations.☆51Updated last month
- ☆23Updated 2 years ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- ☆12Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated 2 months ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆141Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 3 months ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago