uisyudha / TriviumView external linksLinks
Implementation of Trivium Stream Cipher in Python
☆16Jan 23, 2018Updated 8 years ago
Alternatives and similar repositories for Trivium
Users that are interested in Trivium are comparing it to the libraries listed below
Sorting:
- A Python implementation of the block cipher IDEA☆15Nov 24, 2017Updated 8 years ago
- SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA☆24Jul 12, 2013Updated 12 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Steganography tools for JPEG images☆10Jul 30, 2013Updated 12 years ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- Script editor for Scripts.{rxdata, rvdata, rvdata2}☆10Oct 20, 2020Updated 5 years ago
- 从0开始写一个操作系统——《操作系统真象还原》☆12Sep 21, 2020Updated 5 years ago
- Parallel external merge sort via Python/multiprocessing☆10Oct 10, 2011Updated 14 years ago
- Flutter Earth Widget - With null Safety☆11Apr 26, 2022Updated 3 years ago
- 2020招行fintech精英训练营线上数据赛道复盘,第60名☆11May 26, 2020Updated 5 years ago
- IDEA cryptography algorithm☆10Oct 2, 2020Updated 5 years ago
- Quick-start tutorial for specifying a new processor in ghidra☆13Nov 24, 2021Updated 4 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Python driver for fingerprint scanner☆11Apr 23, 2021Updated 4 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- upx变种☆15Aug 2, 2017Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Sliding 8-puzzle / n-puzzle solver in Python, compares BFS, IDDFS and A*.☆12Jan 16, 2015Updated 11 years ago
- The realization of paper 'HD-CNN: Hierarchical Deep Convolutional Neural Networks for Large Scale Visual Recognition'☆10Dec 18, 2025Updated last month
- Cross-assemblers, cross-binutils and cross-compilers needed for rebuilding the UPX stubs☆17Jan 8, 2026Updated last month
- ☆13Sep 9, 2019Updated 6 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- learn llvm☆15Oct 26, 2020Updated 5 years ago
- Pixel 3 (XL) kernel source with linux-stable merged in☆10Jan 9, 2021Updated 5 years ago
- Flutter demo app with Provider state management. Includes Multiple Theme options.☆18Oct 19, 2021Updated 4 years ago
- Bring fast TEA cipher to Python. Powered by Rust.☆17Oct 8, 2025Updated 4 months ago
- ☆13Jan 28, 2023Updated 3 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- The instance generator of the Vision and Rescue block ciphers.☆17Mar 4, 2022Updated 3 years ago
- Code for creating, using, and cloning MT19937 Mersenne Twister PRNGs☆17Dec 5, 2020Updated 5 years ago
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆18Sep 12, 2024Updated last year
- Frontend Website Thư Viện RomCom - Một thể loại anime/manga/light novel Nhật Bản.☆14Jul 1, 2022Updated 3 years ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- ☆22Feb 14, 2022Updated 4 years ago
- embedded Crypto Lib including rsa sha1 sha256 md4 md5 and so on☆14Feb 26, 2020Updated 5 years ago
- Android App Permission data of 2.2 million applications from Google Playstore.☆19Sep 30, 2021Updated 4 years ago
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- Implementation of RC6 encryption and decryption in python.☆20Mar 11, 2017Updated 8 years ago