ilchen / cryptopalsLinks
Solutions to https://cryptopals.com problems
☆28Updated 9 months ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below
Sorting:
- White-box Analysis and Implementation Tools☆78Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Updated 4 years ago
- A Tamarin model and analysis of EMV☆36Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 5 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- ☆26Updated 4 years ago
- ☆20Updated 11 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Updated 2 months ago
- ☆16Updated 5 years ago
- A tool to perform so called BGE attack☆26Updated 7 months ago
- Differential fault analysis framework for AES128☆50Updated 12 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- ☆20Updated 6 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 8 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- A Sage implementation of the ROCA attack☆27Updated 2 years ago
- ☆12Updated 6 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆68Updated 8 years ago
- Research tools developed for Intel Wi-Fi chips☆57Updated 7 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- CSAW Embedded Security Challenge 2019☆37Updated 6 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- Implementation of attacks on cryptosystems☆75Updated 6 months ago