eniac / faasLinks
Factoring as a Service
☆273Updated 6 months ago
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆259Updated 2 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆177Updated 5 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆440Updated 11 months ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Reverse Engineering Page Table Caches in Your Processor☆374Updated 4 years ago
- ☆170Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Pure Python hash length extension module☆129Updated 2 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Testing Schnorr's factorization claim in Sage☆306Updated 3 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- Checking that functions are constant time with Valgrind☆195Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆201Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- ☆152Updated 7 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆294Updated 4 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago