dmhacker / dual-ec-drbgLinks
Interactive proof-of-concept of the Dual_EC_DRBG backdoor
☆15Updated 2 years ago
Alternatives and similar repositories for dual-ec-drbg
Users that are interested in dual-ec-drbg are comparing it to the libraries listed below
Sorting:
- A tweakable block cipher☆31Updated last year
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- betrusted.io main SoC design☆12Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- List of crackpot 'scientists' and 'thinkers'☆19Updated 3 weeks ago
- ☆12Updated last year
- A bitsliced implementation of ECB and CTR AES☆52Updated 11 months ago
- Elliptic curves Rust reference implementation☆16Updated last year
- ☆81Updated 5 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 3 weeks ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- ☆36Updated 3 years ago
- A memory-hard password hashing function.☆70Updated 2 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- A tiny library to properly encrypt IP addresses.☆19Updated last month
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 7 months ago
- Crypto library☆60Updated this week
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 3 weeks ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 9 months ago
- ☆19Updated 5 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆35Updated 4 months ago
- ☆23Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- A tool to help you understand TPM commands and responses.☆45Updated 7 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 3 months ago