Known attacks on Elliptic Curve Cryptography
☆606Nov 8, 2024Updated last year
Alternatives and similar repositories for ECC_Attacks
Users that are interested in ECC_Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementations of cryptographic attacks and utilities.☆1,257Jan 8, 2026Updated 3 months ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24May 1, 2025Updated last year
- A toolkit for cryptanalysis using lattices.☆138Dec 2, 2023Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆144Mar 13, 2024Updated 2 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Source code for "Building Cryptographic Proofs from Hash Functions"☆231Mar 25, 2026Updated last month
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Building Zero Knowledge Proof from Scratch in Rust☆51Nov 10, 2025Updated 5 months ago
- Practical Implementation of the Maurer Reduction☆11Jul 13, 2023Updated 2 years ago
- Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions☆185Oct 12, 2023Updated 2 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- stone-cli is a CLI for proving and verifying Cairo programs.☆25Aug 7, 2025Updated 8 months ago
- MBA deobfuscator via Program Synthesis and Term Rewriting☆66Oct 13, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!☆215Jun 8, 2024Updated last year
- Accelerated Zero-knowledge Virtual Machine by Non-uniform Prover Based on GKR Protocol☆144Updated this week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆37Jan 13, 2026Updated 3 months ago
- Coppersmith's method for multivariate polynomials☆196Oct 11, 2023Updated 2 years ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆71Mar 5, 2023Updated 3 years ago
- ☆12Sep 11, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆341Feb 27, 2026Updated 2 months ago
- Elliptic Curve Fast Fourier Transform built on @arkworks-rs☆67Jun 18, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 9 months ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- verify cairo execution in Halo2☆15Sep 12, 2023Updated 2 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 8 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆343Jul 29, 2024Updated last year
- ☆38Sep 18, 2023Updated 2 years ago
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 5 months ago
- Collection of hypervisor detections☆306Sep 25, 2024Updated last year
- A self-contained example Ethereum challenge using Paradigm's CTF framework☆33Nov 25, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆823Updated this week
- ☆120Apr 22, 2025Updated last year
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,610Jun 19, 2021Updated 4 years ago
- An implementation of Sangria☆17Jun 1, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆125Dec 21, 2024Updated last year
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆403Dec 4, 2024Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year