ROCA: Infineon RSA key vulnerability
- Updated
- Python
![]() |
VOOZH | about |
ROCA: Infineon RSA key vulnerability
Elliptic Curve Cryptography and Common Public Key Cryptography Implementations
Baby Step Giant Step for SECPK1
elliptic curve cryptography with GPU acceleration
Practical Implementation of the Maurer Reduction
Pollard Rho attack on ECDLP with GMP
Attacks on the Diffie Hellman Key Exchange
Elliptic curve tools, ECDSA, and ECDSA attacks.
A collection of notes on mathematical Cryptography, ranging from classical methods through contemporary.
We started from learning programming with crypto at Universities (6 connected Universities in Poland), we voted for programming friendly cryptocurrency, we chose litecoin, we did unexpeced very fast api/wallet for Litecoin, after presentations we get customer who want Dash and Dogecoin, we said ok (not all crypto will work that fast, these can)
Discrete logarithms in the ring of integers modulo n
Different Flavors of the Schnorr signature.
A CUDA based sieve for numbers of the form k*b^n-1. This project is heavily based on SR2Sieve.
Repo contains code samples for practical learning of cryptography.
Julia package for descent elimination algorithms
Algorithms for discret logarithm problem
Mathematical cryptography (custom implementations).
Used algorithms for prime generation/check (Fermat's test and Miler Rabin's test) to implement discrete logarithm (BSGS), and inverse and exponentiation (Extended Euclid's algorithm). Refer to readme.txt for more details.
Add a description, image, and links to the discrete-logarithm topic page so that developers can more easily learn about it.
To associate your repository with the discrete-logarithm topic, visit your repo's landing page and select "manage topics."