meowmeowxw / lattice-based-attacks
πIntroduction to lattice-based attacks in cryptanalysis
β13Updated 10 months ago
Alternatives and similar repositories for lattice-based-attacks:
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
- Breaking ECDSA (not so broken) with LLLβ81Updated 2 weeks ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, β¦β24Updated 3 years ago
- β36Updated 2 years ago
- Solving BDD and uSVP with predicateβ47Updated 8 months ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.β40Updated 2 years ago
- Lattice ECDSA attackβ125Updated 3 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithmsβ13Updated 6 months ago
- β101Updated last year
- ECDSA nonce-reuse attack to recover a private key.β49Updated 4 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.β128Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.β39Updated 7 months ago
- Automated cryptanalysis of substitution permutation network cipherβ29Updated 7 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.β58Updated this week
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020β28Updated 2 years ago
- A repository that aims to provide tools for cryptography and cryptanalysisβ209Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDHβ127Updated last year
- β30Updated last year
- Twist and SubGroup attack on the ECDSA SECP256k1β14Updated 5 months ago
- Implementation of attacks on cryptosystemsβ71Updated 3 years ago
- This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.β18Updated 11 months ago
- Tool for generating Elliptic curve domain parametersβ117Updated last week
- A community driven resource for learning CryptoGraphyβ60Updated last year
- CVP "trick" for CTF challengesβ131Updated last year
- A Sage implementation of the ROCA attackβ22Updated last year
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walksβ56Updated 5 years ago
- β66Updated 4 years ago
- Attacks on ECDSA/SM2 signing algorithmsβ15Updated 6 years ago
- β40Updated 3 weeks ago
- A toolkit for cryptanalysis using lattices.β120Updated last year
- A curated list of awesome side-channel attack resourcesβ75Updated last year