marcelo140 / length-extension
Trying out Length Extension Attack on SHA-256
☆29Updated 3 years ago
Alternatives and similar repositories for length-extension
Users that are interested in length-extension are comparing it to the libraries listed below
Sorting:
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago
- Differential Address Trace Analysis☆56Updated last year
- Tool for generating Elliptic curve domain parameters☆122Updated last month
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆132Updated last year
- Teaching materials related to the Tamarin Prover☆70Updated 9 months ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- A repository trying to collect things related to LLL☆71Updated 8 months ago
- Simple demonstration for how to fuzz test a C++ program with AFL.☆25Updated 5 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆182Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆129Updated 2 years ago
- ☆35Updated 8 years ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 2 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 9 years ago
- Coppersmith's method for multivariate polynomials☆165Updated last year
- Crypto library☆59Updated 2 weeks ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆228Updated 3 years ago
- A Dolev-Yao-model-guided fuzzer for TLS☆139Updated this week
- Moved: https://codeberg.org/koutheir/binary-security-check☆69Updated last year
- A vulnerable C program for testing fuzzers.☆197Updated 2 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆28Updated 4 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 2 months ago
- ☆66Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆40Updated 6 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- ☆30Updated last year
- A full English version of the popular ctf-wiki☆93Updated 10 months ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Pure Python hash length extension module☆124Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- Challenges from pbctf 2020☆33Updated 4 years ago