meowmeowxw / lattice-based-attacksLinks
πIntroduction to lattice-based attacks in cryptanalysis
β14Updated last year
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
Sorting:
- Breaking ECDSA (not so broken) with LLLβ84Updated this week
- Lattice ECDSA attackβ132Updated 3 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, β¦β26Updated 3 years ago
- β40Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.β43Updated 2 years ago
- Solving BDD and uSVP with predicateβ49Updated last year
- β107Updated 2 years ago
- ECDSA nonce-reuse attack to recover a private key.β50Updated 4 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithmsβ14Updated 10 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.β61Updated this week
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020β29Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.β40Updated 11 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.β134Updated last year
- A lookup table for the discrete log in secp265k1β21Updated 4 years ago
- A repository that aims to provide tools for cryptography and cryptanalysisβ217Updated 5 years ago
- Padding Oracle Attack fully explained and coded from scratch in Python3β46Updated 4 years ago
- A toolkit for cryptanalysis using lattices.β125Updated last year
- Tool for generating Elliptic curve domain parametersβ127Updated 3 months ago
- Implementation of attacks on cryptosystemsβ74Updated last week
- Automated cryptanalysis of substitution permutation network cipherβ31Updated 11 months ago
- Kangaroo with the goal of improving efficiency without losing the success rate.β15Updated 7 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDHβ134Updated 2 years ago
- Tool for computing elliptic curve (EC) discrete logarithmsβ37Updated 8 years ago
- Attacks on ECDSA/SM2 signing algorithmsβ15Updated 6 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walksβ57Updated 5 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptographyβ242Updated 2 years ago
- Python implementations of cryptographic attacks and utilities.β1,128Updated 6 months ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.β10Updated last year
- A Python based ECDSA secp256k1 private key recovery toolβ34Updated last year
- β67Updated 5 years ago