Brissouille / LagrangeLinks
Cryptanalysis on differents algorithms with z3 solver sat
☆17Updated last year
Alternatives and similar repositories for Lagrange
Users that are interested in Lagrange are comparing it to the libraries listed below
Sorting:
- Differential fault analysis framework for AES128☆50Updated 12 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆192Updated 4 months ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 3 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated 2 months ago
- White-box Analysis and Implementation Tools☆78Updated 3 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆41Updated 7 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆85Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆66Updated last month
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆93Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Differential Address Trace Analysis☆62Updated last year
- SMT based attacks on non cryptographic PRNGs☆90Updated 2 years ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Updated last year
- Calculate the AES-128 key schedule given any round key☆50Updated last year
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆90Updated 6 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆48Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Updated 5 years ago
- ☆15Updated 5 years ago
- ☆68Updated 5 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- ☆53Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Updated 5 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆38Updated 2 years ago
- A repository of tools for verifying constant-timeness☆19Updated 11 months ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Updated 9 months ago