marcelo140 / length-extension
Trying out Length Extension Attack on SHA-256
☆29Updated 3 years ago
Alternatives and similar repositories for length-extension:
Users that are interested in length-extension are comparing it to the libraries listed below
- SMT based attacks on non cryptographic PRNGs☆80Updated 2 years ago
- Pure Python hash length extension module☆124Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆175Updated 4 years ago
- ☆66Updated 4 years ago
- ☆35Updated 8 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆127Updated last year
- A repository trying to collect things related to LLL☆71Updated 6 months ago
- ☆66Updated 4 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆76Updated 3 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- My write-ups from various CTFs☆118Updated last year
- CTF writeups☆42Updated 3 years ago
- CVP "trick" for CTF challenges☆131Updated last year
- ☆112Updated last year
- TCP flow analyzer with sugar for A/D CTF☆138Updated 2 years ago
- A vulnerable C program for testing fuzzers.☆196Updated 2 years ago
- A CTF platform used in IceCTF 2016☆68Updated 4 years ago
- FAUST Gameserver for attack-defense CTFs☆72Updated 3 months ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 9 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆71Updated 3 weeks ago
- ☆50Updated 2 years ago
- Docker image for attacking cryptography CTF challenges☆98Updated 11 months ago
- Coppersmith's method for multivariate polynomials☆162Updated last year
- DiceCTF 2021 challenge archive☆22Updated 3 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆227Updated 3 years ago
- Differential Address Trace Analysis☆55Updated last year
- A Course in Cryptanalysis☆142Updated 5 months ago
- ☆77Updated 3 years ago
- WeCTF 2021 Source Code & Organizer's Writeup☆26Updated 3 years ago