meowmeowxw / lattice-based-attacks
πIntroduction to lattice-based attacks in cryptanalysis
β13Updated 9 months ago
Alternatives and similar repositories for lattice-based-attacks:
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
- Breaking ECDSA (not so broken) with LLLβ76Updated 8 months ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, β¦β23Updated 3 years ago
- Solving BDD and uSVP with predicateβ45Updated 7 months ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.β40Updated 2 years ago
- β34Updated 2 years ago
- Lattice ECDSA attackβ124Updated 3 years ago
- β99Updated last year
- Python Elliptic Curve Side-Channel Analysis toolkit.β58Updated 2 months ago
- ECDSA nonce-reuse attack to recover a private key.β49Updated 4 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.β127Updated 11 months ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.β39Updated 6 months ago
- Automated cryptanalysis of substitution permutation network cipherβ28Updated 6 months ago
- Implementation of attacks on cryptosystemsβ70Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020β28Updated 2 years ago
- A toolkit for cryptanalysis using lattices.β115Updated last year
- SageMath/Python Toolkit for Cryptanalytic Researchβ39Updated 2 years ago
- This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.β11Updated 10 months ago
- Twist and SubGroup attack on the ECDSA SECP256k1β14Updated 4 months ago
- β66Updated 4 years ago
- Tool for generating Elliptic curve domain parametersβ113Updated 3 months ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.β30Updated last year
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridgesβ28Updated 3 months ago
- A Sage implementation of the ROCA attackβ23Updated last year
- A repository trying to collect things related to LLLβ71Updated 5 months ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Juliaβ49Updated 5 years ago
- CVP "trick" for CTF challengesβ130Updated last year
- A repository that aims to provide tools for cryptography and cryptanalysisβ207Updated 4 years ago
- Attacks on ECDSA/SM2 signing algorithmsβ15Updated 5 years ago
- Pollard Rho attack on ECDLP with GMPβ9Updated 2 years ago