🔐Introduction to lattice-based attacks in cryptanalysis
☆14May 6, 2024Updated 2 years ago
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Feb 2, 2021Updated 5 years ago
- Dumps the private keys from a wallet.dat file.☆11Oct 11, 2019Updated 6 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- Interactive examples explaining the details of how bitcoin calculations work.☆29May 25, 2025Updated 11 months ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆15Sep 14, 2021Updated 4 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 9 years ago
- Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?☆13Nov 12, 2023Updated 2 years ago
- Improve keychain_dumper by adding the functionality to fetch certificates and keys stored in iOS keychain☆16Jun 11, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Elliptic curve calculator with the curve: Secp256k1☆30Dec 8, 2024Updated last year
- Breaking ECDSA (not so broken) with LLL☆92Mar 26, 2026Updated last month
- ☆41Jun 27, 2022Updated 3 years ago
- ☆10Feb 11, 2022Updated 4 years ago
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Aug 14, 2024Updated last year
- Fork of https://github.com/albertobsd/keysubtracter but a Windows version☆10Feb 3, 2023Updated 3 years ago
- Scans the Ethereum network for USDT ERC-20 token transfer transactions☆10May 20, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- ☆17Feb 15, 2023Updated 3 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- ☆11Jun 27, 2021Updated 4 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- Broadcasting Transactions into the Bitcoin Network.☆12Oct 8, 2025Updated 7 months ago
- ☆10May 6, 2021Updated 5 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Mar 27, 2026Updated last month
- ack for wallet.dat's☆10Dec 29, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆19Nov 5, 2023Updated 2 years ago
- An arbitrage bot using UniswapV2 FlashLoan and FlashSwap (not profitable at the moment)☆10Mar 2, 2022Updated 4 years ago
- C++20实现快速傅立叶变换 C++20 implements fast Fourier transform☆16Feb 6, 2022Updated 4 years ago
- Baby Step Giant Step Combined Efforts to Find 1.2 Bitcoin☆11Mar 25, 2021Updated 5 years ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- ☆13May 26, 2022Updated 3 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago