Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"
☆16Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for MSBsOfPrivateKeyAttack
Users that are interested in MSBsOfPrivateKeyAttack are comparing it to the libraries listed below
Sorting:
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Fast lattice reduction☆231Aug 25, 2025Updated 6 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- ☆15Mar 14, 2023Updated 2 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- ☆66Nov 10, 2025Updated 3 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- Coppersmith's method for multivariate polynomials☆193Oct 11, 2023Updated 2 years ago
- JSHack Version One☆10Oct 19, 2025Updated 4 months ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- ☆113Apr 22, 2025Updated 10 months ago
- A tool to resolve seccomp just like seccomp-tools, written in C☆74Updated this week
- ☆15Mar 21, 2025Updated 11 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- A Python interface for https://github.com/fplll/fplll☆158Nov 14, 2025Updated 3 months ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- Repo for collecting part of my public CTF challenges☆42Mar 25, 2024Updated last year
- An nRF52832 based, low power wire / contactless badge with Bluetooth Low Energy 5.0 and NFC functionality.☆10Oct 11, 2019Updated 6 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- 一款专为CLI(命令行)工具设计的集成图形化工具管理平台☆18Aug 21, 2025Updated 6 months ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- The best AES cipher built upon tiny-aes-c. Replace tiny-aes-c code blocks with something else if you want to run it on enterprise servers…☆11Mar 29, 2025Updated 10 months ago
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 4 years ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- ☆12Aug 16, 2024Updated last year
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago