hadipourh / course-cryptanalysis
A Course in Cryptanalysis
☆140Updated 5 months ago
Alternatives and similar repositories for course-cryptanalysis:
Users that are interested in course-cryptanalysis are comparing it to the libraries listed below
- Deployments of fancy cryptography☆134Updated 2 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆127Updated last year
- A list of the state of IETF protocols and PQC☆53Updated last month
- Hosting awesome cryptography CTF challenges from past CTFs☆108Updated 2 months ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Crypto library☆56Updated 2 weeks ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆36Updated last month
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆22Updated this week
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated last year
- A collection of common (interesting) cryptographic mistakes and learning resources.☆332Updated this week
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆79Updated 2 weeks ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- Trail of Bits Testing Handbook☆65Updated 2 weeks ago
- ☆66Updated 4 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆61Updated this week
- ☆228Updated 2 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Some writeups for some CTFs☆17Updated 11 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- A curated list of resources about post-quantum cryptography☆276Updated 5 months ago
- Community Cryptography Test Vectors☆73Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆18Updated this week
- CVP "trick" for CTF challenges☆130Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆29Updated 6 months ago
- High-assurance, high-performance C90 implementation of ML-KEM☆47Updated this week
- A toolkit for cryptanalysis using lattices.☆118Updated last year
- ☆39Updated 9 months ago
- Tool for generating Elliptic curve domain parameters☆115Updated 3 months ago