fx5 / not_randomLinks
Infer internal state of Mersenne Twister from truncated output
☆77Updated 3 years ago
Alternatives and similar repositories for not_random
Users that are interested in not_random are comparing it to the libraries listed below
Sorting:
- A repository trying to collect things related to LLL☆73Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Updated 4 years ago
- ☆68Updated 5 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 10 years ago
- CVP "trick" for CTF challenges☆150Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆89Updated 2 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- rkm0959 implements stuff☆45Updated 3 years ago
- ☆38Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 4 years ago
- Pure Python hash length extension module☆129Updated 2 years ago
- Complex multiplication based factorization☆40Updated 3 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆88Updated last week
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated 2 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆197Updated 5 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆42Updated 7 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆141Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆192Updated 2 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆126Updated 6 months ago
- Leak other players' temporary workspaces for ctf and wargames.☆85Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Updated 5 years ago
- Typora theme based on the CryptoHack blog☆33Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- Symbolic execution for the XorShift128+ algorithm.☆110Updated 8 months ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- An abstraction layer for constraint solvers.☆325Updated this week