☆13Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for Triplet-attack
Users that are interested in Triplet-attack are comparing it to the libraries listed below
Sorting:
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- ☆17May 26, 2020Updated 5 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 6 months ago
- ☆17Jul 31, 2022Updated 3 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Feb 15, 2021Updated 5 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- ☆44Jun 27, 2022Updated 3 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- Side Channels Analysis and Deep Learning☆229Dec 31, 2025Updated 2 months ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Apr 22, 2022Updated 3 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Nov 30, 2021Updated 4 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 3 months ago
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- 2018秋招数据开发类复习总结☆11Aug 5, 2019Updated 6 years ago
- Software Implementation of Masked AES S-box with Packed Multiplication☆22Sep 12, 2020Updated 5 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆191Updated this week
- ☆13May 26, 2022Updated 3 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 6 years ago
- ☆13Mar 3, 2021Updated 4 years ago
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆13Nov 1, 2025Updated 3 months ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- ☆11May 21, 2020Updated 5 years ago
- Datasets from CHES papers on random delays☆13Apr 13, 2021Updated 4 years ago
- DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.☆17Nov 9, 2023Updated 2 years ago
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆12Jun 24, 2021Updated 4 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 7 years ago