meowmeowxw / lattice-based-attacksLinks
πIntroduction to lattice-based attacks in cryptanalysis
β14Updated last year
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
Sorting:
- Breaking ECDSA (not so broken) with LLLβ83Updated 3 months ago
- Lattice ECDSA attackβ131Updated 3 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, β¦β26Updated 3 years ago
- Solving BDD and uSVP with predicateβ49Updated 11 months ago
- β40Updated 3 years ago
- β106Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithmsβ14Updated 9 months ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.β43Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.β61Updated 2 weeks ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.β40Updated 11 months ago
- A repository that aims to provide tools for cryptography and cryptanalysisβ216Updated 5 years ago
- ECDSA nonce-reuse attack to recover a private key.β50Updated 4 years ago
- A toolkit for cryptanalysis using lattices.β124Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.β135Updated last year
- Automated cryptanalysis of substitution permutation network cipherβ31Updated 10 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDHβ132Updated 2 years ago
- A Sage implementation of the ROCA attackβ23Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptographyβ242Updated 2 years ago
- A curated list of awesome side-channel attack resourcesβ83Updated last year
- Tool for generating Elliptic curve domain parametersβ125Updated 3 months ago
- Kangaroo with the goal of improving efficiency without losing the success rate.β14Updated 7 months ago
- Implementation of attacks on cryptosystemsβ74Updated 4 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and mβ¦β97Updated 3 weeks ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.β10Updated last year
- Padding Oracle Attack fully explained and coded from scratch in Python3β46Updated 4 years ago
- Side Channels Analysis and Deep Learningβ212Updated 2 years ago
- CVP "trick" for CTF challengesβ135Updated 2 years ago
- Attacks on ECDSA/SM2 signing algorithmsβ15Updated 6 years ago
- Side-Channel Analysis Libraryβ94Updated last week
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020β29Updated 3 years ago