shainer / matasano
Solutions for the Matasano Crypto Challenges
☆22Updated 5 years ago
Related projects: ⓘ
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆35Updated 10 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- free crypto audit☆31Updated 7 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- ☆168Updated 3 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- ☆19Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆57Updated 7 years ago
- Simple application for playing with elliptic curves☆42Updated last year
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 5 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 7 years ago
- Code to fuzz bignum libraries☆45Updated 5 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 8 years ago
- Tools for timing attacks☆18Updated 8 years ago
- ☆22Updated 7 years ago
- Repo for CSAW CTF 2018 Finals challenges☆56Updated 5 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated 4 months ago
- ☆12Updated 4 years ago
- Solutions to Matasano crypto challenges in Python 3.☆106Updated last year
- Mirror of all PDFs from the IACR's eprint☆46Updated 8 months ago
- A set of templates for different academic venues.☆26Updated 5 years ago
- Using SGX to harden password hashing☆33Updated 8 years ago
- ☆88Updated last month
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 10 years ago
- Auditing Applied Cryptography☆10Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆69Updated 6 years ago