jackieden26 / FMS-Attack
Implementation of RC4 and its FMS Attack
☆12Updated 2 years ago
Related projects: ⓘ
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- Complex multiplication based factorization☆35Updated 2 years ago
- White-box Analysis and Implementation Tools☆70Updated 2 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆13Updated 4 years ago
- Repo for collecting part of my public CTF challenges☆37Updated 5 months ago
- CVP "trick" for CTF challenges☆121Updated last year
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- ☆62Updated 4 years ago
- rkm0959 implements stuff☆40Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆26Updated 3 weeks ago
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- ☆34Updated last month
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- Some crypto scripts which is useful in study and ctf☆25Updated 3 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 4 years ago
- ☆31Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆60Updated 3 years ago
- ☆37Updated last year
- ☆32Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆106Updated 8 months ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 2 years ago
- Collections of all CTF challenges made by me.☆17Updated 5 months ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆24Updated 4 years ago
- Functions for solving linear inequalities in integers☆32Updated 2 weeks ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- A Sage implementation of the ROCA attack☆20Updated last year
- SMT based attacks on non cryptographic PRNGs☆73Updated last year
- ☆12Updated 4 years ago
- Implicit White-box Implementations of ARX Ciphers☆13Updated last year