robertdavidgraham / ecb-penguin
Demonstrating the famous ECB penguin so that you can repeat the process yourself.
☆43Updated 2 years ago
Alternatives and similar repositories for ecb-penguin:
Users that are interested in ecb-penguin are comparing it to the libraries listed below
- A collection of common (interesting) cryptographic mistakes and learning resources.☆338Updated this week
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆60Updated 2 years ago
- A Course in Cryptanalysis☆142Updated 5 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆29Updated 3 weeks ago
- Checking that functions are constant time with Valgrind☆179Updated 8 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated last year
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆25Updated 4 years ago
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆14Updated 2 months ago
- ☆39Updated 10 months ago
- SMT based attacks on non cryptographic PRNGs☆80Updated 2 years ago
- GLM uCode dumps☆286Updated 4 years ago
- meta repository for ctftime.org issues, feature-requests etc☆72Updated 7 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆27Updated 5 years ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆22Updated last week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- Infer internal state of Mersenne Twister from truncated output☆75Updated 2 years ago
- ☆22Updated 2 years ago
- A collection of Ascon implementations & documents (as submodules)☆43Updated last week
- Solution descriptions for all the problems on foreverCTF☆10Updated 7 months ago
- Crypto Audit Guidelines☆133Updated 4 years ago
- A tweakable block cipher☆31Updated 10 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- TPM-Fail Attack code & data☆120Updated last year
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆43Updated 4 months ago
- Software of the NIST Post-Quantum submission NewHope☆45Updated 4 years ago
- Docker image for attacking cryptography CTF challenges☆99Updated 11 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- A PGP packet visualizer☆178Updated 4 months ago
- Tool for generating Elliptic curve domain parameters☆117Updated last week