🔐Introduction to lattice-based attacks in cryptanalysis
☆14May 6, 2024Updated last year
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2022-24122 Proof of Concept☆13Mar 15, 2022Updated 4 years ago
- ☆10Feb 2, 2021Updated 5 years ago
- Dumps the private keys from a wallet.dat file.☆12Oct 11, 2019Updated 6 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A crawler for kernel releases distributed by the major Linux distributions.☆13Oct 18, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- All the project is about to get Armbian (Tested on version Jammy-current) on Odroid HC4 without erase petitboot partition on your board.☆11Feb 11, 2024Updated 2 years ago
- An index of blocklists and a tool to extract CIDRs to use in firewalls and network appliances.☆12Aug 3, 2023Updated 2 years ago
- ☆13Mar 3, 2017Updated 9 years ago
- Blockthon Python Package for Generate and Converting Wallet Private Key and Mnemonic for Address Bitcoin☆28Mar 7, 2024Updated 2 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- POC about how to detect windows kernel debug by pool tag.☆13Nov 29, 2023Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ansible playbooks to provision firecracker VMs and run Falco kernel tests☆14Mar 2, 2026Updated 3 weeks ago
- Interactive examples explaining the details of how bitcoin calculations work.☆30May 25, 2025Updated 10 months ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- A pure functional Scala SAT solver☆10Oct 30, 2023Updated 2 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆14Sep 14, 2021Updated 4 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 9 years ago
- A distributed real-time system for video surveillance☆10Mar 13, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- Breaking ECDSA (not so broken) with LLL☆91Updated this week
- Elliptic curve calculator with the curve: Secp256k1☆31Dec 8, 2024Updated last year
- Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?☆13Nov 12, 2023Updated 2 years ago
- Improve keychain_dumper by adding the functionality to fetch certificates and keys stored in iOS keychain☆16Jun 11, 2018Updated 7 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Mar 11, 2026Updated 2 weeks ago
- ☆10Feb 11, 2022Updated 4 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Aug 14, 2024Updated last year
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- Fork of https://github.com/albertobsd/keysubtracter but a Windows version☆10Feb 3, 2023Updated 3 years ago
- Scans the Ethereum network for USDT ERC-20 token transfer transactions☆10May 20, 2022Updated 3 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- ☆17Feb 15, 2023Updated 3 years ago