onechip / dlog-nfs
Solve discrete logarithm problems by the number field sieve method.
☆17Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for dlog-nfs
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Updated 9 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆12Updated 5 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆27Updated 2 years ago
- ☆19Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆30Updated 2 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated last year
- pollard's p-1 algorithm on CUDA☆24Updated 10 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Tool for computing elliptic curve (EC) discrete logarithms☆35Updated 7 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Analysis and generation of substitutions☆22Updated 2 years ago
- Imported from svn://scm.gforge.inria.fr/svnroot/ecm/☆21Updated 10 months ago
- Breaking ECDSA (not so broken) with LLL☆74Updated 5 months ago
- ☆32Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆17Updated 7 months ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Source code developed in the BLOC project☆20Updated 5 years ago