Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"
☆16Oct 8, 2025Updated 5 months ago
Alternatives and similar repositories for MSBsOfPrivateKeyAttack
Users that are interested in MSBsOfPrivateKeyAttack are comparing it to the libraries listed below
Sorting:
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Fast lattice reduction☆233Aug 25, 2025Updated 6 months ago
- ☆24Mar 4, 2025Updated last year
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- ☆15Mar 14, 2023Updated 3 years ago
- ☆67Nov 10, 2025Updated 4 months ago
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- Coppersmith's method for multivariate polynomials☆195Oct 11, 2023Updated 2 years ago
- ☆113Apr 22, 2025Updated 10 months ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Lattices and Their Algorithms, Leiden, Spring 2024☆23Aug 13, 2024Updated last year
- A Python interface for https://github.com/fplll/fplll☆160Nov 14, 2025Updated 4 months ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- JSHack Version One☆10Oct 19, 2025Updated 5 months ago
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 8 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- An nRF52832 based, low power wire / contactless badge with Bluetooth Low Energy 5.0 and NFC functionality.☆10Oct 11, 2019Updated 6 years ago
- ☆13Jan 16, 2022Updated 4 years ago
- ☆17Jul 12, 2024Updated last year
- Penetration Testing - Intermediate Level☆16Feb 25, 2020Updated 6 years ago
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Jun 21, 2018Updated 7 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- ☆12Jan 27, 2022Updated 4 years ago
- ☆15Aug 6, 2021Updated 4 years ago
- Example code to help getting start with SootUp☆14Aug 7, 2025Updated 7 months ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- The best AES cipher built upon tiny-aes-c. Replace tiny-aes-c code blocks with something else if you want to run it on enterprise servers…☆11Mar 29, 2025Updated 11 months ago
- ☆12Aug 25, 2018Updated 7 years ago
- LaTex e-book editable template that also typesets to the book about writing the book☆15Sep 7, 2021Updated 4 years ago
- A tool to resolve seccomp just like seccomp-tools, written in C☆74Mar 10, 2026Updated last week