Known attacks on Elliptic Curve Cryptography
☆599Nov 8, 2024Updated last year
Alternatives and similar repositories for ECC_Attacks
Users that are interested in ECC_Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementations of cryptographic attacks and utilities.☆1,246Jan 8, 2026Updated 3 months ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24May 1, 2025Updated 11 months ago
- A toolkit for cryptanalysis using lattices.☆136Dec 2, 2023Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆144Mar 13, 2024Updated 2 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Source code for "Building Cryptographic Proofs from Hash Functions"☆227Mar 25, 2026Updated 2 weeks ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Building Zero Knowledge Proof from Scratch in Rust☆51Nov 10, 2025Updated 5 months ago
- Practical Implementation of the Maurer Reduction☆11Jul 13, 2023Updated 2 years ago
- Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions☆184Oct 12, 2023Updated 2 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- stone-cli is a CLI for proving and verifying Cairo programs.☆24Aug 7, 2025Updated 8 months ago
- MBA deobfuscator via Program Synthesis and Term Rewriting☆65Oct 13, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!☆212Jun 8, 2024Updated last year
- Accelerated Zero-knowledge Virtual Machine by Non-uniform Prover Based on GKR Protocol☆140Apr 4, 2026Updated last week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆38Jan 13, 2026Updated 2 months ago
- Coppersmith's method for multivariate polynomials☆196Oct 11, 2023Updated 2 years ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆71Mar 5, 2023Updated 3 years ago
- ☆12Sep 11, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆338Feb 27, 2026Updated last month
- Elliptic Curve Fast Fourier Transform built on @arkworks-rs☆67Jun 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 8 months ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- verify cairo execution in Halo2☆15Sep 12, 2023Updated 2 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆339Jul 29, 2024Updated last year
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 5 months ago
- Collection of hypervisor detections☆302Sep 25, 2024Updated last year
- A self-contained example Ethereum challenge using Paradigm's CTF framework☆32Nov 25, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆806Apr 4, 2026Updated last week
- ☆115Apr 22, 2025Updated 11 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,602Jun 19, 2021Updated 4 years ago
- An implementation of Sangria☆17Jun 1, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆124Dec 21, 2024Updated last year
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆402Dec 4, 2024Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year