eniac / faasLinks
Factoring as a Service
☆271Updated 4 months ago
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below
Sorting:
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Seed recovery tool for PRNGs☆384Updated 7 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆253Updated 2 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 9 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- ☆170Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- ☆152Updated 7 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆517Updated 4 months ago
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- ROCA: Infineon RSA key vulnerability☆487Updated 2 years ago
- free crypto audit☆31Updated 8 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆292Updated 3 years ago
- Checking that functions are constant time with Valgrind☆192Updated 8 years ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- ☆24Updated last year
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago