marcelo140 / length-extensionLinks
Trying out Length Extension Attack on SHA-256
☆29Updated 4 years ago
Alternatives and similar repositories for length-extension
Users that are interested in length-extension are comparing it to the libraries listed below
Sorting:
- Tool for generating Elliptic curve domain parameters☆129Updated 5 months ago
- SMT based attacks on non cryptographic PRNGs☆86Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- A community driven resource for learning CryptoGraphy☆69Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆27Updated last year
- ☆112Updated 2 years ago
- Synced with SGX101 gitbook.☆31Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆139Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆61Updated last year
- A repository of tools for verifying constant-timeness☆18Updated 8 months ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 2 months ago
- A Course in Cryptanalysis☆146Updated last year
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 10 years ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- ☆37Updated 8 years ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 3 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated 10 months ago
- ☆67Updated 5 years ago
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆215Updated 5 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆191Updated 4 years ago
- ☆52Updated 3 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Updated 4 years ago
- A repository trying to collect things related to LLL☆71Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆93Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆76Updated 3 months ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆84Updated 9 months ago
- ☆33Updated this week