meowmeowxw / lattice-based-attacks
🔐Introduction to lattice-based attacks in cryptanalysis
☆12Updated 4 months ago
Related projects: ⓘ
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆38Updated last year
- Breaking ECDSA (not so broken) with LLL☆71Updated 3 months ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆22Updated 2 years ago
- ☆32Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆53Updated 2 weeks ago
- Automated cryptanalysis of substitution permutation network cipher☆26Updated 3 weeks ago
- ☆86Updated last year
- Lattice ECDSA attack☆114Updated 2 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- Solving BDD and uSVP with predicate☆40Updated last month
- CHES 2022 White-box Cryptography Tutorial☆19Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆108Updated 6 months ago
- Cryptography & CTF Writeups☆82Updated last year
- ECDSA nonce-reuse attack to recover a private key.☆48Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆26Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- ☆62Updated 4 years ago
- ☆14Updated 4 years ago
- A repository trying to collect things related to LLL☆69Updated last week
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆80Updated last year
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- Complex multiplication based factorization☆35Updated 2 years ago
- White-box Analysis and Implementation Tools☆70Updated 2 years ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated last month
- CVP "trick" for CTF challenges☆121Updated last year
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- ☆24Updated 6 months ago
- ☆19Updated 4 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆26Updated 3 years ago