phirasit / shor_cudaLinks
Shor's algorithm simulation using CUDA
☆19Updated 6 years ago
Alternatives and similar repositories for shor_cuda
Users that are interested in shor_cuda are comparing it to the libraries listed below
Sorting:
- pollard's p-1 algorithm on CUDA☆28Updated 11 years ago
- NVidia sass disassembler/inline patcher☆34Updated this week
- ☆13Updated 2 years ago
- A Collection of Hashing Algorithms Implemented In CUDA☆93Updated 6 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- Solve discrete logarithm problems by the number field sieve method.☆19Updated 8 years ago
- Imported from svn://scm.gforge.inria.fr/svnroot/ecm/☆28Updated last year
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- ☆50Updated this week
- ECM Factorization on CUDA-GPUs☆14Updated 5 years ago
- The public release of LeftoverLocals code☆70Updated last year
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Updated 10 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆32Updated 3 years ago
- C++ STL for speed and cryptanalytic application☆11Updated 2 weeks ago
- User-Mode Driver for Tenstorrent hardware☆36Updated this week
- Baremetal softwares for TrivialMIPS platform☆11Updated 6 years ago
- Artifacts for "Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization" (IEEE S&P '26)☆57Updated 3 months ago
- Simple tool to calculate sha256 on GPU using Cuda☆102Updated last year
- ☆20Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆89Updated last month
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 9 months ago
- Native Segwit (Bech32) vanity address generator using the secp256k1 library used in Bitcoin Core.☆21Updated last year
- ☆112Updated 2 years ago
- ☆15Updated 3 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Embedded Universal DSL: a good DSL for us, by us☆58Updated this week
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆13Updated 6 months ago