sethtroisi / gmp-ecm
Imported from svn://scm.gforge.inria.fr/svnroot/ecm/
☆21Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for gmp-ecm
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆26Updated last month
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆22Updated 4 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆16Updated last year
- An implementation of Dumer's algorithm for Information Set Decoding.☆12Updated 9 months ago
- Implementation of the fastest ISD algorithms☆18Updated this week
- Fast constant-time AES implementations on 32-bit architectures☆61Updated 3 weeks ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- ☆32Updated 2 years ago
- Proof-of-concept for the GhostWrite CPU bug.☆101Updated 3 months ago
- A programming language to write bitsliced ciphers☆56Updated 2 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆78Updated 2 years ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- Minimal implementation of the OpenMP runtime library.☆11Updated 2 years ago
- QARMA block cipher in C☆24Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆39Updated last year
- YAFU's sieve of Eratosthenes in library form with standalone executable☆11Updated 5 months ago
- Prediction algorithms for the PCG pseudo-random generator☆9Updated 3 years ago
- masked, bit-sliced AES-128 demo code☆13Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- pollard's p-1 algorithm on CUDA☆24Updated 10 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆43Updated 3 weeks ago
- AVX512 population count routines☆22Updated 5 years ago
- Side-channel traces visualizer☆13Updated 7 months ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆24Updated 4 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆74Updated 5 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆54Updated 3 months ago
- Solve discrete logarithm problems by the number field sieve method.☆17Updated 7 years ago
- DFA scripts using Jlsca☆10Updated 5 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 4 months ago