19 skills found
anishathalye / Neural Hash ColliderPreimage attack against NeuralHash 💣
vislearn / PrimeDepthPrimeDepth: Efficient Monocular Depth Estimation with a Stable Diffusion Preimage
trevphil / CryptosymSAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions
drewstone / Rust MiximusA zkSNARK implementation of a merkle tree membership preimage proof.
narodnik / Sapvisha256(sha256(preimage)) in zk
dark-ln / Preimage StealerNo description available
kothasuhas / Verify InputProvably Bounding Neural Network Preimages
Zhang-Xiyue / PreimageApproxForNNsNo description available
a-ro / PreimageStructured prediction with string kernels
jaonoctus / LnreceiptNo description available
Mach-34 / The WordCLI for verififying knowledge of preimages of hashes
biometricsecurity / Preimage Attack On BTP TemplateNo description available
qiboteam / Quantum Search Scaled Hash PreimagesCode for a quantum implementation of Grover oracles for finding scaled hash function preimages.
partylikeits1983 / Privacy Voteproving knowledge of a hash preimage of a leaf in an intermediate merkle tree in Noir
changleibox / Preimage图片预览
hirorylabo / Preimage AttacksSAT-solver and probabilistic preimage attacks on SHA-256, MD5, and BitCoin
carlosamcruz / BITCOIN TX PREIMAGE TUTORIALNo description available
HuinaLi / Automatic Preimage Attack Framework On Ascon XofThe source codes and results are used to help verify the results in our paper.
aashwinraj / AES 128This is encryption and decryption using AES-128 bit. This also includes a preimage finding algorithm using a cipher text and a random 128 bit key. the program takes a 128 bit input in form of characters and return a 128 bit output in hexadecimal.