gionanide / CryptographyLinks
Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions RC4, Steganography, Feistel cipher, Superincreasing Knapsac, Elliptic Curve Cryptography, Diffie Hellman & EDF.
☆20Updated 2 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- A repository that aims to provide tools for cryptography and cryptanalysis☆215Updated 4 years ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago
- An implementation of the NTRU encryption and decryption algorithm in Python 3☆16Updated 8 months ago
- This repository give exmaple of attacks on SEAL, to show the danger of using homomorphic encryption☆4Updated 6 years ago
- Simple python implementation of NTRUEncrypt cryptosystem☆57Updated 4 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆14Updated 2 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆95Updated 2 months ago
- A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber☆255Updated 3 months ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆29Updated 4 years ago
- ☆26Updated 3 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆133Updated last year
- Library of Crypto exploits☆9Updated 2 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆25Updated 4 years ago
- Repository to deploy CTFd using docker.☆41Updated 4 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆30Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- BLISS: Bimodal Lattice Signature Schemes☆26Updated 4 years ago
- Things we learned from Capture The Flag hacking competitions we participated in☆21Updated 4 years ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Writeups to Crypto Challenges in CTFs☆40Updated 6 years ago
- Th3g3ntl3man CTF Writeups☆21Updated 6 years ago
- Solutions for the Matasano Crypto Challenges☆22Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆132Updated 2 years ago
- NTRU Python Library with Application to Encrypted Domain☆31Updated 2 weeks ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Automating the boring stego work for you..☆15Updated 6 years ago
- Malicious but fun scripts☆21Updated 5 years ago
- A community driven resource for learning CryptoGraphy☆65Updated 2 years ago