☆13Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for Triplet-attack
Users that are interested in Triplet-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17May 26, 2020Updated 5 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆12Aug 26, 2025Updated 8 months ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- ☆17Jul 31, 2022Updated 3 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆36Feb 15, 2021Updated 5 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last month
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- Side Channels Analysis and Deep Learning☆242Dec 31, 2025Updated 4 months ago
- ☆45Jun 27, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 复刻何同学的《智能杯垫》制作的提醒喝水器☆10Mar 8, 2022Updated 4 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 6 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆196Apr 22, 2026Updated last week
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆12Apr 8, 2026Updated 3 weeks ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆54Feb 15, 2020Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆19Jul 17, 2025Updated 9 months ago
- ☆20Aug 3, 2018Updated 7 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- VexRiscv reference platforms for the pqriscv project☆16Mar 9, 2024Updated 2 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- mit 6.5840: Distributed Systems Spring 2023☆16Apr 10, 2023Updated 3 years ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆40Apr 22, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆13Jun 24, 2021Updated 4 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆16Nov 19, 2020Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Nov 30, 2021Updated 4 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- ☆12Jul 13, 2018Updated 7 years ago