dmhacker / dual-ec-drbgLinks
Interactive proof-of-concept of the Dual_EC_DRBG backdoor
☆17Updated 3 years ago
Alternatives and similar repositories for dual-ec-drbg
Users that are interested in dual-ec-drbg are comparing it to the libraries listed below
Sorting:
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- ☆12Updated 5 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆28Updated 5 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆13Updated last week
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Updated 2 years ago