Brissouille / Lagrange
Cryptanalysis on differents algorithms with z3 solver sat
☆17Updated 9 months ago
Alternatives and similar repositories for Lagrange
Users that are interested in Lagrange are comparing it to the libraries listed below
Sorting:
- Differential fault analysis framework for AES128☆49Updated 11 years ago
- White-box Design and Analysis kit☆24Updated last year
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆26Updated 4 months ago
- ☆14Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 5 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- Solutions to https://cryptopals.com problems☆28Updated 3 weeks ago
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Differential Address Trace Analysis☆56Updated last year
- A tool to perform so called BGE attack☆24Updated last year
- Processor fuzzer targeting the Armv8-A ISA☆59Updated 2 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆181Updated 11 months ago
- Support of Nvidia Falcon processors for Ghidra☆70Updated 8 months ago
- ☆24Updated last year
- AES-128 and DES differential fault analysis☆16Updated 4 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆21Updated last year
- ☆12Updated 5 years ago
- ☆12Updated 3 years ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆24Updated 3 weeks ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 2 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 2 years ago
- ☆18Updated 11 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 4 years ago
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆14Updated last year
- Some tee/trustzone helper stuff☆52Updated 5 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆40Updated 2 years ago
- Translates a high-level declarative description of a simplification rule for Ghidra's decompiler into the C++ code that is required for t…☆16Updated 2 years ago