Elliptic Curve Cryptography and Common Public Key Cryptography Implementations
☆107Mar 31, 2025Updated 11 months ago
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below
Sorting:
- Perform an arbitrary series of actions in the EVM in a single transaction.☆13Oct 21, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Reconstruction of the Akropolis Delphi reentrancy exploit☆10Mar 25, 2021Updated 4 years ago
- Php script private key bitcoin check if balance☆10Dec 28, 2017Updated 8 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- ☆12Oct 7, 2019Updated 6 years ago
- LayerZero Contracts for Relay Endpoint☆21Aug 2, 2022Updated 3 years ago
- ☆17Jul 11, 2025Updated 7 months ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- Learn Cairo and StarkNet Smart Contract programming with example code☆23Nov 2, 2022Updated 3 years ago
- A Chat Application In Pure Python with 256-Bit AES Encryption.☆15Oct 4, 2020Updated 5 years ago
- A PRF with low multiplicative complexity☆20Feb 18, 2020Updated 6 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- dalek-compatible implementation of the merlin transcript protocol☆28Feb 11, 2020Updated 6 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- A spot to add introductory resources for people getting into the space☆27Aug 8, 2021Updated 4 years ago
- Fully-compatible implementation of Privacy Pass in Rust.☆34Apr 20, 2020Updated 5 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago
- SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA☆24Jul 12, 2013Updated 12 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 5 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 4 years ago
- ☆28May 8, 2023Updated 2 years ago
- File Encryption/Decryption and Implementation of Digital Signature using Elliptical Curve Cryptography technique.☆34Jun 12, 2015Updated 10 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Creating a standard for whitehats☆29Dec 29, 2022Updated 3 years ago
- A basic implementation of Yao's Garbled Circuits☆30Apr 18, 2022Updated 3 years ago
- mevETH LST Protocol - Repo has migrated see link☆26Mar 12, 2024Updated last year
- Shenlong is a blazingly fast ⚡ tool to generate LLVM IR from Cairo, written in Rust 🦀☆67Mar 24, 2023Updated 2 years ago
- Deadalus is a modular toolkit for zkSNARKs development and deployment written in Go using Gnark.☆34Feb 26, 2023Updated 3 years ago
- Cards Against Blockchain☆34Oct 31, 2024Updated last year
- A Python3 Implementation of LLL☆36Apr 29, 2021Updated 4 years ago