eniac / faasLinks
Factoring as a Service
☆275Updated 7 months ago
Alternatives and similar repositories for faas
Users that are interested in faas are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆385Updated 7 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆261Updated 2 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆178Updated 5 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆442Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- ☆170Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- GPL Number Field Sieve implementation☆36Updated 14 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 9 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 4 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Updated 4 years ago
- Testing Schnorr's factorization claim in Sage☆306Updated 3 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 8 years ago
- Pure Python hash length extension module☆130Updated 3 years ago
- ☆24Updated last year
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- ☆153Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- ☆121Updated 8 years ago