marcelo140 / length-extension
Trying out Length Extension Attack on SHA-256
☆27Updated 3 years ago
Alternatives and similar repositories for length-extension:
Users that are interested in length-extension are comparing it to the libraries listed below
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆122Updated 10 months ago
- ☆35Updated 7 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Tool for generating Elliptic curve domain parameters☆112Updated last month
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆124Updated last year
- Crypto library☆55Updated 3 months ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆41Updated 3 years ago
- SMT based attacks on non cryptographic PRNGs☆79Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 10 months ago
- A repository of tools for verifying constant-timeness☆13Updated last month
- Differential Address Trace Analysis☆54Updated 9 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆69Updated 7 months ago
- ☆13Updated 3 years ago
- ☆12Updated 4 years ago
- ☆35Updated 2 years ago
- Synced with SGX101 gitbook.☆31Updated last year
- Language for high-assurance and high-speed cryptography☆278Updated this week
- ☆29Updated 9 months ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆91Updated last year
- ☆29Updated 3 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆26Updated 2 months ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆25Updated last month
- ☆43Updated this week
- ☆66Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Teaching materials related to the Tamarin Prover☆65Updated 5 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 5 years ago
- Lattices in Cryptography (University of Michigan)☆75Updated 3 months ago