kjson / pyfactorLinks
General number field sieve for python
☆18Updated 10 years ago
Alternatives and similar repositories for pyfactor
Users that are interested in pyfactor are comparing it to the libraries listed below
Sorting:
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Updated 9 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Updated 4 years ago
- Python bindings for SPHINCS+☆23Updated 3 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 3 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆11Updated 11 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Updated 7 years ago
- distributed.net client public source code. (Note: this codebase does not have networking or buffer file capabilities)☆47Updated last year
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- ☆14Updated 8 years ago
- XMSS[MT] commandline tool☆13Updated last year
- A basic implementation of the Small Primes Number-Theoretic Transform (NTT) multiplication algorithm.☆24Updated 7 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆180Updated 5 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.☆32Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 7 years ago
- SAT-based Bitcoin Mining☆88Updated 3 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆102Updated 8 years ago
- SHA-3 finalist (reference code)☆40Updated 11 years ago
- A memory-hard password hashing function.☆70Updated 2 years ago
- How fast can we brute force a 64-bit comparison?☆54Updated 5 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Solve discrete logarithm problems by the number field sieve method.☆19Updated 8 years ago
- Implementation of Kravatte Encryption Suite☆15Updated 6 years ago