eniac / faasLinks
Factoring as a Service
☆275Updated 6 months ago
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆385Updated 7 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆261Updated 2 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆440Updated 11 months ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆178Updated 5 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- ☆170Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Testing Schnorr's factorization claim in Sage☆306Updated 3 years ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- Working with numbers (primes, modular, etc.)☆246Updated 3 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 4 years ago
- ☆68Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- attacking RSA via lattice reductions (LLL)☆829Updated 4 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Checking that functions are constant time with Valgrind☆197Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆492Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 9 years ago
- ☆77Updated 10 years ago
- ☆24Updated last year