Factoring as a Service
☆275Jul 8, 2025Updated 9 months ago
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- attacking RSA via lattice reductions (LLL)☆832Apr 11, 2021Updated 5 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- Coppersmith's method for multivariate polynomials☆196Oct 11, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆68Apr 13, 2020Updated 6 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- ☆16Aug 10, 2018Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- dude, is my code constant time?☆201Mar 19, 2024Updated 2 years ago
- CVE-2015-3152 PoC☆43May 11, 2015Updated 10 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Feb 19, 2018Updated 8 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- Lattice algorithms using floating-point arithmetic☆401Oct 15, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A coding challenge to learn Rust☆14Oct 19, 2017Updated 8 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- ☆37Sep 18, 2023Updated 2 years ago
- ☆26Nov 21, 2011Updated 14 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago