fanosta / aeskeyschedule
Calculate the AES-128 key schedule given any round key
☆30Updated last year
Alternatives and similar repositories for aeskeyschedule
Users that are interested in aeskeyschedule are comparing it to the libraries listed below
Sorting:
- Side-Channel Analysis Library☆89Updated last week
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- ☆48Updated last year
- ☆31Updated last year
- ☆45Updated 3 weeks ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆90Updated 2 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆40Updated last month
- ☆21Updated 2 months ago
- Repo for collecting part of my public CTF challenges☆41Updated last year
- ☆33Updated last year
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 3 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆19Updated this week
- CHES 2022 White-box Cryptography Tutorial☆20Updated 2 years ago
- ☆11Updated 2 months ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Some writeups for some CTFs☆17Updated last year
- Functions for solving linear inequalities in integers☆46Updated last month
- ☆49Updated 3 weeks ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated last month
- ☆66Updated 5 years ago
- rkm0959 implements stuff☆44Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆122Updated last month
- A toolkit for cryptanalysis using lattices.☆122Updated last year
- CVP "trick" for CTF challenges☆134Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆132Updated last year
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆104Updated 4 months ago
- Implementation of the fastest ISD algorithms☆22Updated 2 months ago