Infer internal state of Mersenne Twister from truncated output
☆77Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for not_random
Users that are interested in not_random are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 5 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- ☆10Nov 23, 2021Updated 4 years ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 4 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated last year
- Cracking psuedorandom stuffs.☆25Jan 14, 2026Updated 4 months ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- ☆38Jul 8, 2023Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆197Oct 11, 2023Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆16Aug 8, 2019Updated 6 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Seed recovery tool for PRNGs☆390Sep 17, 2018Updated 7 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Nov 25, 2024Updated last year
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 6 years ago
- O(n log n) algorithm finding solutions of Erdős-Ginzburg-Ziv theorem.☆14Aug 18, 2022Updated 3 years ago
- SMT based attacks on non cryptographic PRNGs☆94Mar 23, 2023Updated 3 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Oct 7, 2019Updated 6 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆143Jun 18, 2025Updated 11 months ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 5 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- ☆14Mar 3, 2021Updated 5 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 3 years ago
- いちかのBEMANI超じゃんけん大会2020 autorun☆11Nov 8, 2020Updated 5 years ago
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AES implementation for Cairo☆27Feb 27, 2022Updated 4 years ago
- My CTF Challenges. No one plays.☆13Dec 4, 2022Updated 3 years ago
- A tweakable block cipher☆31May 17, 2024Updated 2 years ago
- ☆24Sep 12, 2024Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Fast lattice reduction☆240Aug 25, 2025Updated 8 months ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year