Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
☆26Nov 25, 2024Updated last year
Alternatives and similar repositories for thesis
Users that are interested in thesis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Implementation of the ROCA attack☆17Nov 26, 2020Updated 5 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆42May 21, 2025Updated 11 months ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 4 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- White-box cryptography based on FAPKC algorithm☆29Dec 31, 2025Updated 4 months ago
- ☆39Sep 18, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 5 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆219Jun 24, 2020Updated 5 years ago
- EthSential is a security analysis framework for Ethereum smart contracts. It bundles other tools to find vulnerabilities in smart contrac…☆23Oct 6, 2020Updated 5 years ago
- Lattice algorithms using floating-point arithmetic☆404Oct 15, 2025Updated 7 months ago
- XII : TLS1.3/暗号ゼミ [全国大会2018-集中開発コース]☆16Dec 22, 2018Updated 7 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- :+1: voting badge like Travis CI☆27Jan 22, 2021Updated 5 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated last year
- Cryptanalysis library for breaking classical ciphers☆26Jun 10, 2019Updated 6 years ago
- A android view which can add sticker and zoom,drag,delete it 贴纸 文字☆19Mar 6, 2017Updated 9 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Vulnerable Web App☆13Nov 11, 2015Updated 10 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Jun 10, 2019Updated 6 years ago
- Whitebox AES implementation in C++. Chow, Karroumi.☆379Feb 23, 2023Updated 3 years ago
- A programming language to write bitsliced ciphers☆61Sep 4, 2024Updated last year
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 5 months ago
- my ctf chals☆11Jul 7, 2025Updated 10 months ago
- Implementation of known practical attack on some AES variant☆17Apr 3, 2024Updated 2 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆13Apr 28, 2016Updated 10 years ago