marcelo140 / length-extension
Trying out Length Extension Attack on SHA-256
☆27Updated 3 years ago
Alternatives and similar repositories for length-extension:
Users that are interested in length-extension are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- LLVM with SGX support☆13Updated 7 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆79Updated 2 years ago
- ☆35Updated 7 years ago
- Tor anonymity network for SGX☆46Updated 5 years ago
- ☆49Updated 2 years ago
- ☆66Updated 4 years ago
- Automatic detection of speculative information flows☆67Updated 3 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆25Updated 2 months ago
- Differential Address Trace Analysis☆54Updated 10 months ago
- Synced with SGX101 gitbook.☆31Updated last year
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆16Updated last year
- ☆37Updated 5 years ago
- ☆112Updated last year
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Tool for generating Elliptic curve domain parameters☆113Updated 2 months ago
- Scone Website☆11Updated 3 weeks ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- Teaching materials related to the Tamarin Prover☆68Updated 6 months ago
- ☆30Updated 10 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆69Updated 8 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated 5 years ago
- Variation of american fuzzy lop for testing compilers☆122Updated 2 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 years ago
- Infer internal state of Mersenne Twister from truncated output☆72Updated 2 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆27Updated last week
- CVP "trick" for CTF challenges☆130Updated last year