johndoe31415 / toyeccLinks
Elliptic Curve Cryptography playground/toolkit written in pure Python
☆67Updated 2 years ago
Alternatives and similar repositories for toyecc
Users that are interested in toyecc are comparing it to the libraries listed below
Sorting:
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆70Updated last week
- A bitsliced implementation of ECB and CTR AES☆52Updated last year
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- Tool for generating Elliptic curve domain parameters☆127Updated 4 months ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 7 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆61Updated last week
- ☆36Updated 3 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Python library for fast elliptic curve crypto☆281Updated 7 months ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- ☆23Updated 3 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆53Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- ☆20Updated 5 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 10 months ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 9 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆97Updated last year
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago