├── ECHNP ├── BabyDH2-Aliyun2024 │ ├── exp.py │ └── task.py ├── README.md ├── XHS_Lattice.py ├── coppersmith_reduce.py ├── echnp_copper_tester.py ├── echnp_oracle.py ├── echnp_solver.ipynb ├── echnp_solver.py ├── findRootsZZ.py ├── lll.py ├── logger.py ├── optimized_echnp_solver.py └── rootfind_ZZ.py ├── FSB ├── FSB-Implementation.ipynb ├── FSB.py └── README.md ├── LICENSE ├── MultivariateHSSP ├── A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.ipynb ├── README.md ├── img │ ├── image-1.png │ ├── image-2.png │ ├── image.png │ ├── multi1.png │ └── multi2.png ├── multivariate_attack.sage ├── ns_attack.sage └── paper_implementation.sage ├── README.md ├── ReconstructingRSA ├── README.md ├── Reconstructing RSA Private Keys from Random Key Bits.ipynb └── reconstructing_rsa_privkey.py ├── ShareRSA ├── README.md ├── bivariate_copper.sage ├── copper_imp.ipynb └── note-book.pdf └── matprod ├── README.md ├── attack.ipynb ├── break_alternating.py ├── break_direct.py └── chall.py /ECHNP/BabyDH2-Aliyun2024/exp.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/BabyDH2-Aliyun2024/exp.py -------------------------------------------------------------------------------- /ECHNP/BabyDH2-Aliyun2024/task.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/BabyDH2-Aliyun2024/task.py -------------------------------------------------------------------------------- /ECHNP/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/README.md -------------------------------------------------------------------------------- /ECHNP/XHS_Lattice.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/XHS_Lattice.py -------------------------------------------------------------------------------- /ECHNP/coppersmith_reduce.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/coppersmith_reduce.py -------------------------------------------------------------------------------- /ECHNP/echnp_copper_tester.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/echnp_copper_tester.py -------------------------------------------------------------------------------- /ECHNP/echnp_oracle.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/echnp_oracle.py -------------------------------------------------------------------------------- /ECHNP/echnp_solver.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/echnp_solver.ipynb -------------------------------------------------------------------------------- /ECHNP/echnp_solver.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/echnp_solver.py -------------------------------------------------------------------------------- /ECHNP/findRootsZZ.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/findRootsZZ.py -------------------------------------------------------------------------------- /ECHNP/lll.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/lll.py -------------------------------------------------------------------------------- /ECHNP/logger.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/logger.py -------------------------------------------------------------------------------- /ECHNP/optimized_echnp_solver.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/optimized_echnp_solver.py -------------------------------------------------------------------------------- /ECHNP/rootfind_ZZ.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ECHNP/rootfind_ZZ.py -------------------------------------------------------------------------------- /FSB/FSB-Implementation.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/FSB/FSB-Implementation.ipynb -------------------------------------------------------------------------------- /FSB/FSB.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/FSB/FSB.py -------------------------------------------------------------------------------- /FSB/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/FSB/README.md -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/LICENSE -------------------------------------------------------------------------------- /MultivariateHSSP/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.ipynb -------------------------------------------------------------------------------- /MultivariateHSSP/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/README.md -------------------------------------------------------------------------------- /MultivariateHSSP/img/image-1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/img/image-1.png -------------------------------------------------------------------------------- /MultivariateHSSP/img/image-2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/img/image-2.png -------------------------------------------------------------------------------- /MultivariateHSSP/img/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/img/image.png -------------------------------------------------------------------------------- /MultivariateHSSP/img/multi1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/img/multi1.png -------------------------------------------------------------------------------- /MultivariateHSSP/img/multi2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/img/multi2.png -------------------------------------------------------------------------------- /MultivariateHSSP/multivariate_attack.sage: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/multivariate_attack.sage -------------------------------------------------------------------------------- /MultivariateHSSP/ns_attack.sage: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/ns_attack.sage -------------------------------------------------------------------------------- /MultivariateHSSP/paper_implementation.sage: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/MultivariateHSSP/paper_implementation.sage -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/README.md -------------------------------------------------------------------------------- /ReconstructingRSA/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ReconstructingRSA/README.md -------------------------------------------------------------------------------- /ReconstructingRSA/Reconstructing RSA Private Keys from Random Key Bits.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ReconstructingRSA/Reconstructing RSA Private Keys from Random Key Bits.ipynb -------------------------------------------------------------------------------- /ReconstructingRSA/reconstructing_rsa_privkey.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ReconstructingRSA/reconstructing_rsa_privkey.py -------------------------------------------------------------------------------- /ShareRSA/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ShareRSA/README.md -------------------------------------------------------------------------------- /ShareRSA/bivariate_copper.sage: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ShareRSA/bivariate_copper.sage -------------------------------------------------------------------------------- /ShareRSA/copper_imp.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ShareRSA/copper_imp.ipynb -------------------------------------------------------------------------------- /ShareRSA/note-book.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/ShareRSA/note-book.pdf -------------------------------------------------------------------------------- /matprod/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/matprod/README.md -------------------------------------------------------------------------------- /matprod/attack.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/matprod/attack.ipynb -------------------------------------------------------------------------------- /matprod/break_alternating.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/matprod/break_alternating.py -------------------------------------------------------------------------------- /matprod/break_direct.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/matprod/break_direct.py -------------------------------------------------------------------------------- /matprod/chall.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tl2cents/Implementation-of-Cryptographic-Attacks/HEAD/matprod/chall.py --------------------------------------------------------------------------------