Simple application for playing with elliptic curves
☆43Nov 24, 2022Updated 3 years ago
Alternatives and similar repositories for EccPlayground
Users that are interested in EccPlayground are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- ☆35Aug 29, 2012Updated 13 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆871Updated this week
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 11 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 9 months ago
- Factoring as a Service☆276Jul 8, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆37Jun 24, 2015Updated 10 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Apr 10, 2017Updated 9 years ago
- TLS labs☆30Apr 24, 2020Updated 6 years ago
- ☆51Jun 1, 2017Updated 8 years ago
- ☆30Oct 26, 2011Updated 14 years ago
- A Flask-like µFramework for Gopher☆20Jul 18, 2025Updated 9 months ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- The specification and the reference implementation of Salt Channel - a simple, light-weight secure channel protocol based on TweetNaCl by…☆15Feb 17, 2023Updated 3 years ago
- ☆42May 29, 2024Updated last year
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 13 years ago