luminousmen / ZUC
Stream cipher ZUC - core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3.
☆20Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ZUC
- Implementation for ZUC stream cipher☆16Updated 8 years ago
- ☆12Updated 5 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 9 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆41Updated last year
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- CTF writeup for learning☆22Updated 3 years ago
- ☆19Updated 4 years ago
- WTF are those magic numbers?!!☆33Updated 2 years ago
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆12Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- OCB-AES authenticated encryption for Python☆13Updated 3 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- Fuzz testing on JavaScriptCore and WebAssembly in WebKit☆4Updated 4 years ago
- ☆27Updated last month
- An IDA processor for eBPF bytecode☆32Updated 7 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆21Updated 5 years ago
- Program Chair's Website for CCS 2017☆12Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- ☆13Updated 5 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆71Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 5 years ago
- x86 Dynamic Binary Translator Library☆34Updated 3 years ago