Generator of "nothing-up-my-sleeve" constants
☆24Jul 3, 2015Updated 10 years ago
Alternatives and similar repositories for numsgen
Users that are interested in numsgen are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2014Updated 11 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- ☆42May 29, 2024Updated last year
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- A multi-platform Unix CLI that prints a symlink's complete chain of targets using absolute paths.☆13Dec 27, 2022Updated 3 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Aug 12, 2015Updated 10 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- A library for doing constant-time fixed-point numeric operations☆26Nov 6, 2020Updated 5 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- A simple kickstarter clone, for internal project bounties and backing.☆39May 8, 2015Updated 10 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- 🎨 A tool program to set terminal colors from image☆10May 3, 2017Updated 8 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- ☆21Dec 20, 2012Updated 13 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Mar 26, 2014Updated 11 years ago
- exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;☆13Jan 1, 2016Updated 10 years ago
- ☆19Apr 30, 2024Updated last year
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- MLS architecture☆75Mar 31, 2025Updated 11 months ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago