Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
☆73Oct 5, 2017Updated 8 years ago
Alternatives and similar repositories for EdDSA-fault-attack
Users that are interested in EdDSA-fault-attack are comparing it to the libraries listed below
Sorting:
- PS4 SFlash0 Tool / Python☆10May 11, 2024Updated last year
- ☆21Oct 3, 2021Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- Simple Frontend for Flatz's Remote PKG Installer☆25Jan 19, 2025Updated last year
- Homomorphic Encryption Randomness Beacon☆13Dec 3, 2019Updated 6 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Ethereum DEVnet - one node, automatic address generation, genesis block setup + mining script ~160MB☆12Mar 6, 2021Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Mar 8, 2026Updated last week
- free crypto audit☆31Mar 28, 2017Updated 8 years ago
- A warmboot bootrom exploit for the Nintendo Switch☆58May 5, 2021Updated 4 years ago
- ☆12Aug 6, 2023Updated 2 years ago
- Simple homomorphic encryption based on Paillier cryptosystem implementation in Go. Supports floating point numbers, addition, subtraction…☆10Nov 13, 2022Updated 3 years ago
- Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides☆18Jun 28, 2019Updated 6 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- ☆17Nov 14, 2022Updated 3 years ago
- ☆12Jan 6, 2018Updated 8 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Rust binding for fastpbkdf2☆15Jun 29, 2025Updated 8 months ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Simulations for the Hydra protocol☆15Jan 26, 2024Updated 2 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Go port of zopfli, a zlib-compatible compression library☆28Feb 5, 2023Updated 3 years ago
- ☆14Feb 25, 2015Updated 11 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- The purpose of this document is to gather public information on vulnerabilities introduced on Blockchains software.☆14Nov 13, 2019Updated 6 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- Embedded systems C2 software written in C/C#☆20Sep 19, 2018Updated 7 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Mar 17, 2023Updated 3 years ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- ☆171Mar 15, 2021Updated 5 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Feb 15, 2021Updated 5 years ago