marcelo140 / length-extension
Trying out Length Extension Attack on SHA-256
☆29Updated 3 years ago
Alternatives and similar repositories for length-extension:
Users that are interested in length-extension are comparing it to the libraries listed below
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆131Updated last year
- SMT based attacks on non cryptographic PRNGs☆80Updated 2 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆128Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆163Updated last year
- Tool for generating Elliptic curve domain parameters☆121Updated last week
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- ☆66Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆81Updated 3 years ago
- ☆35Updated 8 years ago
- A repository of tools for verifying constant-timeness☆18Updated 2 months ago
- Differential Address Trace Analysis☆55Updated last year
- ☆112Updated last year
- In service of posteriority☆45Updated 2 years ago
- Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course☆167Updated last year
- A repository trying to collect things related to LLL☆71Updated 7 months ago
- Automated cryptanalysis of substitution permutation network cipher☆30Updated 8 months ago
- ☆37Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- ☆30Updated last year
- CVP "trick" for CTF challenges☆133Updated last year
- Bleichenbachers "Million message attack" on RSA in Python☆28Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- Pure Python hash length extension module☆124Updated 2 years ago
- Complex multiplication based factorization☆37Updated 3 years ago
- FAUST Gameserver for attack-defense CTFs☆72Updated 4 months ago
- Docker image for attacking cryptography CTF challenges☆100Updated 11 months ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆113Updated 3 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆72Updated last month