eboda / mersenne-twister-recoverLinks
Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.
☆47Updated 10 years ago
Alternatives and similar repositories for mersenne-twister-recover
Users that are interested in mersenne-twister-recover are comparing it to the libraries listed below
Sorting:
- SMT based attacks on non cryptographic PRNGs☆88Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆97Updated 4 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Updated 3 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆195Updated 4 years ago
- Complex multiplication based factorization☆40Updated 3 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆140Updated last year
- Coppersmith's method for multivariate polynomials☆191Updated 2 years ago
- CVP "trick" for CTF challenges☆149Updated 2 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆89Updated 3 weeks ago
- A repository trying to collect things related to LLL☆72Updated last year
- rkm0959 implements stuff☆45Updated 3 years ago
- ☆68Updated 5 years ago
- Implementation of attacks on cryptosystems☆75Updated 4 months ago
- Pure Python hash length extension module☆129Updated 2 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- A full English version of the popular ctf-wiki☆104Updated last year
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated 2 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆42Updated 6 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- Small python module for common CTF crypto functions☆165Updated 3 years ago
- An abstraction layer for constraint solvers.☆324Updated this week
- ☆64Updated last month
- Hosting awesome cryptography CTF challenges from past CTFs☆125Updated 6 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆137Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 4 years ago
- Implementation of the ROCA attack☆17Updated 5 years ago
- My write-ups from various CTFs☆118Updated last year
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 weeks ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- Predict python's random module generated values.☆425Updated last year