trevphil / cryptosym
SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions
☆38Updated 2 years ago
Alternatives and similar repositories for cryptosym:
Users that are interested in cryptosym are comparing it to the libraries listed below
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆28Updated 2 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆25Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Updated 8 months ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 4 years ago
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆42Updated 5 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆56Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆121Updated last week
- Breaking ECDSA (not so broken) with LLL☆81Updated 3 weeks ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆13Updated 7 months ago
- CGen is a tool for encoding SHA-1 and SHA-256 hash functions into CNF in DIMACS format, also into ANF polynominal system in PolyBoRi outp…☆25Updated last year
- SAT-based Bitcoin Mining☆85Updated 3 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆36Updated 7 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆22Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated 2 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆30Updated last year
- elliptic curve cryptography with GPU acceleration☆21Updated 2 years ago
- ☆101Updated last year
- An implementation of the LowMC block cipher family.☆27Updated 7 years ago
- ☆37Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 8 months ago
- Solving BDD and uSVP with predicate☆48Updated 8 months ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆9Updated 5 years ago
- Lattice ECDSA attack☆126Updated 3 years ago
- A tiny ellliptic curve library☆79Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆29Updated 5 months ago
- Program for finding low gate count implementations of S-boxes.☆39Updated 6 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.☆9Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago