security-kouza / Lattice-Attacks-on-EC-DSA
Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, "Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage", to appear at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022/1.
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Lattice-Attacks-on-EC-DSA
- Solving BDD and uSVP with predicate☆44Updated 3 months ago
- ☆34Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆74Updated 5 months ago
- Lattice ECDSA attack☆117Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated last year
- ☆92Updated last year
- ☆30Updated last year
- ☆31Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆27Updated 2 months ago
- ☆25Updated last year
- 🔐Introduction to lattice-based attacks in cryptanalysis☆13Updated 6 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- ☆13Updated last year
- ☆35Updated last month
- A toolkit for cryptanalysis using lattices.☆103Updated 11 months ago
- CVP "trick" for CTF challenges☆123Updated last year
- rkm0959 implements stuff☆43Updated 2 years ago
- Repo for collecting part of my public CTF challenges☆39Updated 7 months ago
- Attacks on ECDSA/SM2 signing algorithms☆15Updated 5 years ago
- Representing DES in Z3☆15Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆118Updated 8 months ago
- ☆66Updated 4 years ago
- ECDSA nonce-reuse attack to recover a private key.☆49Updated 4 years ago
- A Sage implementation of the ROCA attack☆23Updated last year
- Functions for solving linear inequalities in integers☆37Updated 3 weeks ago
- Coppersmith's method for multivariate polynomials☆156Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆41Updated last year
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆53Updated 5 years ago
- Fast lattice reduction☆170Updated 3 months ago