ninthDevilHAUNSTER / ecc_learningLinks
shaobaobaoer 的椭圆曲线密码学习之路
☆12Updated 6 years ago
Alternatives and similar repositories for ecc_learning
Users that are interested in ecc_learning are comparing it to the libraries listed below
Sorting:
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆39Updated 2 years ago
- Cryptographic algorithm implementation☆49Updated 2 years ago
- Sth in Control-Flow Integrity☆20Updated 6 years ago
- ☆39Updated 3 years ago
- angr中文版文档☆33Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 8 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- Post-Quantum Magic Project. See more at https://pqcrypto.dev/ . We also open-sourced at https://gitee.com/pqcrypto/pqmagic.☆42Updated 3 weeks ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆14Updated 5 years ago
- Repo for colecting all my public CTF challenges☆28Updated 6 months ago
- Web-Security-Learning☆9Updated 7 years ago
- Some crypto scripts which is useful in study and ctf☆29Updated 3 years ago
- Meltdown/Spectre experiments☆54Updated 7 years ago
- ☆33Updated 2 years ago
- ☆18Updated 2 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆24Updated last month
- An attempt to learn glibc heap.☆43Updated 5 years ago
- resources for mini lctf 2020☆24Updated last year
- ☆22Updated last year
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Updated 4 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Updated 8 years ago
- Correlation Power Analysis☆13Updated 6 years ago
- 解决IDA Pro 7.0版本在遇到使用CET技术的ELF文件时符号解析错误的问题☆18Updated 4 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆186Updated 4 years ago