Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456
☆21Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for keycommitment
Users that are interested in keycommitment are comparing it to the libraries listed below
Sorting:
- ☆20Dec 13, 2019Updated 6 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆13Mar 3, 2021Updated 4 years ago
- ☆25Nov 2, 2021Updated 4 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- Materials for Edcon 2019 webcast☆11Mar 31, 2019Updated 6 years ago
- Formalization of the UTxO abstract model for (bitcoin-style) blockchain transactions.☆14Nov 14, 2024Updated last year
- Audit Proposals and Reports for RandomX☆12Aug 3, 2019Updated 6 years ago
- Notebooks showing how to use CryptoUtilities☆14Apr 17, 2025Updated 10 months ago
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- Pentium II microcode (dis)assembler and (de)scrambler☆21Feb 11, 2021Updated 5 years ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- Chosen-Prefix Collision Attack Against SHA-1 Hash Function☆17Feb 17, 2020Updated 6 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆19Aug 30, 2024Updated last year
- espresso logic minimizer (https://embedded.eecs.berkeley.edu/pubs/downloads/espresso/index.htm)☆17Oct 29, 2022Updated 3 years ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Nov 19, 2022Updated 3 years ago
- IPython-style interaction for Cryptol☆15Dec 5, 2016Updated 9 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- A PRF with low multiplicative complexity☆20Feb 18, 2020Updated 6 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- Extract bits from photos☆90Apr 30, 2020Updated 5 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- ☆25Aug 9, 2022Updated 3 years ago
- Low cost open source Lattice iCE40UP5k FPGA board.☆20Dec 15, 2020Updated 5 years ago
- ☆22Oct 3, 2022Updated 3 years ago