Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
☆26Nov 25, 2024Updated last year
Alternatives and similar repositories for thesis
Users that are interested in thesis are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Go package to perform common cryptanalysis functions.☆15Sep 23, 2017Updated 8 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆41May 21, 2025Updated 9 months ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- ARCore sample project that visualizes the human heart on a marker and allows to freely place and transform nerve cells.☆12Jul 20, 2020Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- Re-implementation of Lambda Twist P3P solver (ECCV 2018)☆13Dec 10, 2021Updated 4 years ago
- White-box cryptography based on FAPKC algorithm☆29Dec 31, 2025Updated 2 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 4 years ago
- ☆14Jan 25, 2020Updated 6 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Jun 24, 2020Updated 5 years ago
- EthSential is a security analysis framework for Ethereum smart contracts. It bundles other tools to find vulnerabilities in smart contrac…☆23Oct 6, 2020Updated 5 years ago
- XII : TLS1.3/暗号ゼミ [全国大会2018-集中開発コース]☆16Dec 22, 2018Updated 7 years ago
- Transfer learning on Inception-v3 using the BreakHis dataset.☆11Dec 5, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- Reed-Solomon Error Correction CODEC☆27Nov 8, 2018Updated 7 years ago
- Cryptanalysis library for breaking classical ciphers☆26Jun 10, 2019Updated 6 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- A android view which can add sticker and zoom,drag,delete it 贴纸 文字☆19Mar 6, 2017Updated 9 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 4 years ago
- ☆12Jun 10, 2019Updated 6 years ago
- A programming language to write bitsliced ciphers☆60Sep 4, 2024Updated last year
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆13Apr 28, 2016Updated 9 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- ☆13Sep 18, 2023Updated 2 years ago