hadipourh / course-cryptanalysis
A Course in Cryptanalysis
☆128Updated last month
Related projects: ⓘ
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆89Updated 7 months ago
- Deployments of fancy cryptography☆113Updated last month
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- A list of the state of IETF protocols and PQC☆42Updated 3 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆100Updated last month
- A collection of common (interesting) cryptographic mistakes and learning resources.☆314Updated last month
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆108Updated 6 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆21Updated 2 months ago
- A curated list of resources about post-quantum cryptography☆239Updated 3 months ago
- Crypto Audit Guidelines☆132Updated 3 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆72Updated 9 months ago
- Experimental implementation of KEMTLS in Rustls☆26Updated 10 months ago
- List of crackpot 'scientists' and 'thinkers'☆13Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆47Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- Post-quantum cryptography certificates☆36Updated 2 weeks ago
- Crypto library☆50Updated last month
- Tool for generating Elliptic curve domain parameters☆106Updated 8 months ago
- Standard curve database.☆100Updated 3 weeks ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆58Updated 3 weeks ago
- Tutorials from TPM.dev members☆89Updated 2 months ago
- Docker image for attacking cryptography CTF challenges☆93Updated 4 months ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆273Updated this week
- ☆22Updated 2 years ago
- ☆12Updated last year
- CVP "trick" for CTF challenges☆121Updated last year
- Cryptography & CTF Writeups☆82Updated last year
- DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code☆13Updated 3 months ago
- A toolkit for cryptanalysis using lattices.☆92Updated 9 months ago