Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
☆26Nov 25, 2024Updated last year
Alternatives and similar repositories for thesis
Users that are interested in thesis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆42May 21, 2025Updated 11 months ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- ARCore sample project that visualizes the human heart on a marker and allows to freely place and transform nerve cells.☆13Jul 20, 2020Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 4 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Re-implementation of Lambda Twist P3P solver (ECCV 2018)☆13Dec 10, 2021Updated 4 years ago
- White-box cryptography based on FAPKC algorithm☆29Dec 31, 2025Updated 3 months ago
- ☆38Sep 18, 2023Updated 2 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 5 years ago
- EthSential is a security analysis framework for Ethereum smart contracts. It bundles other tools to find vulnerabilities in smart contrac…☆23Oct 6, 2020Updated 5 years ago
- Lattice algorithms using floating-point arithmetic☆403Oct 15, 2025Updated 6 months ago
- XII : TLS1.3/暗号ゼミ [全国大会2018-集中開発コース]☆16Dec 22, 2018Updated 7 years ago
- Transfer learning on Inception-v3 using the BreakHis dataset.☆11Dec 5, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- :+1: voting badge like Travis CI☆27Jan 22, 2021Updated 5 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated last year
- A android view which can add sticker and zoom,drag,delete it 贴纸 文字☆19Mar 6, 2017Updated 9 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Vulnerable Web App☆13Nov 11, 2015Updated 10 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 5 years ago
- ☆12Jun 10, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A programming language to write bitsliced ciphers☆61Sep 4, 2024Updated last year
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 5 months ago
- my ctf chals☆11Jul 7, 2025Updated 9 months ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆13Apr 28, 2016Updated 10 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated 2 years ago
- ☆13Sep 18, 2023Updated 2 years ago