Timing Attack on TLS' ECDSA signature
☆47Sep 8, 2015Updated 10 years ago
Alternatives and similar repositories for SSL-TLS-ECDSA-timing-attack
Users that are interested in SSL-TLS-ECDSA-timing-attack are comparing it to the libraries listed below
Sorting:
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- attacking RSA via lattice reductions (LLL)☆833Apr 11, 2021Updated 4 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Nov 30, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- This is example code for a Rabin-Williams public-key signature scheme designed to provide high speed verification and small signatures.☆16Oct 9, 2008Updated 17 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆64Oct 17, 2014Updated 11 years ago
- Wildcard DNS with few features☆13Jan 14, 2026Updated 2 months ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- ☆13Jul 26, 2025Updated 7 months ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Bignum bindings for rust backed by GMP☆15Oct 13, 2017Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Google's list of Certificate Transparency logs as a rust crate for use with sct.rs☆14Feb 17, 2023Updated 3 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Pure Python SSL, TLS and DTLS library☆36Mar 4, 2018Updated 8 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- SSL and TLS protocol test suite and fuzzer☆617Updated this week
- ☆10Aug 8, 2015Updated 10 years ago
- ☆12May 7, 2021Updated 4 years ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago