meowmeowxw / lattice-based-attacks
πIntroduction to lattice-based attacks in cryptanalysis
β14Updated last year
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
Sorting:
- Breaking ECDSA (not so broken) with LLLβ81Updated last month
- Solving BDD and uSVP with predicateβ48Updated 9 months ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, β¦β25Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.β41Updated 2 years ago
- β37Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.β59Updated last month
- Lattice ECDSA attackβ129Updated 3 years ago
- A repository that aims to provide tools for cryptography and cryptanalysisβ211Updated 4 years ago
- β102Updated last year
- Implementation of attacks on cryptosystemsβ72Updated 4 years ago
- A toolkit for cryptanalysis using lattices.β122Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.β132Updated last year
- Attacking ECDSA with nonce leakage using lattice-based algorithmsβ14Updated 7 months ago
- CHES 2022 White-box Cryptography Tutorialβ20Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDHβ129Updated 2 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Juliaβ49Updated 5 years ago
- β31Updated last year
- SMT based attacks on non cryptographic PRNGsβ81Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipherβ31Updated 8 months ago
- Tool for generating Elliptic curve domain parametersβ122Updated last month
- Elliptic curve tools, ECDSA, and ECDSA attacks.β40Updated 9 months ago
- Cryptography & CTF Writeupsβ82Updated 2 years ago
- CVP "trick" for CTF challengesβ134Updated last year
- Proof Of Concept that exploits PuTTy CVE-2024-31497.β9Updated last year
- SageMath/Python Toolkit for Cryptanalytic Researchβ39Updated 2 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and mβ¦β90Updated 2 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)β32Updated last month
- A free and open source tool for Deep Learning Side Channel Analysisβ16Updated 5 years ago
- This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.β19Updated last year
- A Sage implementation of the ROCA attackβ22Updated 2 years ago