pts / chacha20Links
Pure Python 2 and Python 3 implementations of the ChaCha20 stream cipher
☆21Updated 5 years ago
Alternatives and similar repositories for chacha20
Users that are interested in chacha20 are comparing it to the libraries listed below
Sorting:
- ChaCha20 stream cipher in C☆29Updated last year
- A Python implementation of the NewHope post-quantum cryptographic scheme.☆19Updated 3 years ago
- Pure python ChaCha20Poly1305 implementation☆25Updated 5 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆44Updated 6 months ago
- Detect x86 shellcode in files and traffic.☆24Updated 6 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆44Updated 7 years ago
- SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA☆24Updated 11 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- ECM Factorization on CUDA-GPUs☆13Updated 4 years ago
- ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)☆18Updated 4 years ago
- ☆12Updated 5 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- Tool for generating Elliptic curve domain parameters☆122Updated last month
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- ☆12Updated last year
- Encryption Algorithm Combined☆27Updated 9 years ago
- Fuzz Network Traffic☆18Updated 5 months ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Updated 9 years ago
- Pickle decompiler plugin for Radare2☆18Updated last year
- ☆20Updated 3 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Imported from svn://scm.gforge.inria.fr/svnroot/ecm/☆25Updated last year
- GUI manager for network tunnels developed for Command and Control systems.☆11Updated 2 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- Interactive proof-of-concept of the Dual_EC_DRBG backdoor☆14Updated 2 years ago
- SECCURE compatible Elliptic Curve cryptography in Python☆94Updated 5 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last year
- Small portable HMAC in C☆75Updated 7 months ago