security-kouza / Lattice-Attacks-on-EC-DSA
Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, "Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage", to appear at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022/1.
☆22Updated 2 years ago
Related projects: ⓘ
- Breaking ECDSA (not so broken) with LLL☆71Updated 3 months ago
- ☆32Updated 2 years ago
- Lattice ECDSA attack☆114Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆38Updated last year
- Solving BDD and uSVP with predicate☆40Updated last month
- ☆86Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆26Updated 3 weeks ago
- CVP "trick" for CTF challenges☆121Updated last year
- Representing DES in Z3☆15Updated last year
- Attacks on ECDSA/SM2 signing algorithms☆14Updated 5 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- ☆34Updated last month
- ☆31Updated last year
- ☆22Updated last year
- rkm0959 implements stuff☆40Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- Repo for collecting part of my public CTF challenges☆37Updated 5 months ago
- ☆12Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆108Updated 6 months ago
- ☆23Updated last year
- ECDSA nonce-reuse attack to recover a private key.☆48Updated 3 years ago
- A toolkit for cryptanalysis using lattices.☆92Updated 9 months ago
- Fast lattice reduction☆160Updated last month
- Cryptography & CTF Writeups☆82Updated last year
- Functions for solving linear inequalities in integers☆32Updated 2 weeks ago
- ☆62Updated 4 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆12Updated 4 months ago
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 4 years ago
- Coppersmith's method for multivariate polynomials☆150Updated 11 months ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆37Updated last month