hellman / cryLinks
SageMath/Python Toolkit for Cryptanalytic Research
☆41Updated 8 months ago
Alternatives and similar repositories for cry
Users that are interested in cry are comparing it to the libraries listed below
Sorting:
- ☆68Updated 5 years ago
- CVP "trick" for CTF challenges☆150Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Updated 2 years ago
- rkm0959 implements stuff☆45Updated 3 years ago
- A repository trying to collect things related to LLL☆73Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 3 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- Complex multiplication based factorization☆40Updated 3 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated last year
- Coppersmith's method for multivariate polynomials☆190Updated 2 years ago
- White-box Analysis and Implementation Tools☆78Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- Fast lattice reduction☆226Updated 5 months ago
- ☆15Updated 5 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Updated last year
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- SMT based attacks on non cryptographic PRNGs☆90Updated 2 years ago
- ☆66Updated 2 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated last month
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- A toolkit for cryptanalysis using lattices.☆135Updated 2 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Updated 3 years ago
- Implementation of the ROCA attack☆17Updated 5 years ago
- ☆20Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Updated 3 years ago
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Updated 5 years ago