eniac / faasLinks
Factoring as a Service
☆268Updated last month
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆382Updated 6 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆248Updated 2 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 7 months ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- ☆170Updated 4 years ago
- How to backdoor Diffie-Hellman☆614Updated 9 years ago
- ROCA: Infineon RSA key vulnerability☆485Updated last year
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆122Updated 8 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- ☆24Updated last year
- Documentation for the Mechanical Phish.☆234Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆45Updated 9 years ago
- Working with numbers (primes, modular, etc.)☆243Updated 3 years ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- Pure Python hash length extension module☆126Updated 2 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆661Updated last year
- ☆470Updated 9 months ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago