Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.
☆15Dec 4, 2024Updated last year
Alternatives and similar repositories for Implementation-of-Cryptographic-Attacks
Users that are interested in Implementation-of-Cryptographic-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Sep 18, 2023Updated 2 years ago
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 5 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A toolkit for cryptanalysis using lattices.☆138Dec 2, 2023Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆195Oct 11, 2023Updated 2 years ago
- ☆24Mar 4, 2025Updated last year
- Practical Implementation of the Maurer Reduction☆10Jul 13, 2023Updated 2 years ago
- Fast lattice reduction☆233Aug 25, 2025Updated 7 months ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 8 months ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- ☆67Nov 10, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- ☆113Apr 22, 2025Updated 11 months ago
- 侧信道攻击学习笔记☆31Dec 29, 2022Updated 3 years ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- 记录一下Windows下的Hook技巧☆15Jul 15, 2024Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated 2 years ago
- Lattices and Their Algorithms, Leiden, Spring 2024☆23Aug 13, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bringing the power of SageMath to VS Code with this extension that offers specialized syntax highlighting, quick run capabilities, and ad…☆49Jan 20, 2026Updated 2 months ago
- ☆35May 26, 2023Updated 2 years ago
- Linux controller for the Thermaltake LCD Panel Kit (Tower 200 Mini Chassis Model)☆14Aug 24, 2024Updated last year
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- Automatic use of House of Some & House of Illusion.☆87Sep 9, 2025Updated 6 months ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- Dump your Xbox game disks to usb☆13May 10, 2021Updated 4 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11May 17, 2021Updated 4 years ago
- ☆11Mar 2, 2024Updated 2 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 3 months ago
- Public repository of 2026 crackmes.one CTF RE challenge☆28Mar 10, 2026Updated 2 weeks ago
- blog☆28Mar 11, 2026Updated 2 weeks ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Mar 20, 2026Updated last week
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Apr 20, 2021Updated 4 years ago