Imam Uasa's starred repositories
cryptocoding
Guidelines for low-level cryptography software
crypto-attacks
Python implementations of cryptographic attacks and utilities.
RSA-and-LLL-attacks
attacking RSA via lattice reductions (LLL)
ed25519-dalek
Fast and efficient ed25519 signing and verification in Rust.
Diffie-Hellman_Backdoor
How to backdoor Diffie-Hellman
x25519-dalek
X25519 elliptic curve Diffie-Hellman key exchange in pure-Rust, using curve25519-dalek.
CryptoGotchas
A collection of common (interesting) cryptographic mistakes and learning resources.
My-CTF-Challenges
Challenges I created for CTF competitions.
coppersmith
Coppersmith's method for multivariate polynomials
Inequality_Solving_with_CVP
CVP "trick" for CTF challenges
Castryck-Decru-SageMath
A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH
JWT-Key-Recovery
A tool that recovers the public key used to sign JWT tokens
BreakingRainbow
Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper
not_random
Infer internal state of Mersenne Twister from truncated output
aes-brute-force
Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)
symbolic_mersenne_cracker
Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs
CVE-2021-22911
Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1
cryptography
Some crypto scripts which is useful in study and ctf
FMS-Attack
Implementation of RC4 and its FMS Attack