mfaerevaag / cryptanalysis
Practical Cryptoanalysis
☆12Updated 8 years ago
Related projects: ⓘ
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- CryptoBib Main Repository for Developers☆18Updated last month
- Tools for attacking cryptographic implementations.☆21Updated 7 years ago
- SIDH C reference implementation☆13Updated 7 years ago
- A cryptographic method that defends against side-channel attacks☆24Updated 7 years ago
- free crypto audit☆31Updated 7 years ago
- ☆17Updated this week
- ☆16Updated 10 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆57Updated 7 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆50Updated 6 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆22Updated 9 years ago
- Simple application for playing with elliptic curves☆42Updated last year
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- A user-first approach to threat modeling.☆14Updated 4 years ago
- ☆19Updated this week
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Attacks on Jarvis and Friday☆10Updated 4 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆17Updated 6 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- ☆14Updated this week
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆35Updated 2 years ago