CENSUS / masked-aes-cView external linksLinks
Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks
☆40Oct 7, 2020Updated 5 years ago
Alternatives and similar repositories for masked-aes-c
Users that are interested in masked-aes-c are comparing it to the libraries listed below
Sorting:
- Fast UTF-8 codepoint sets for Zig.☆11Mar 17, 2025Updated 10 months ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 5 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- A container library for Zig.☆17May 12, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Designs of first-order SCA-secure hardware implementations of AES encryption/decryptoin dedicated to Xilinx FPGAs (using BRAM)☆16Dec 24, 2020Updated 5 years ago
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- Memory utilities for the Zig programming language, including a reference counted pointer☆17Nov 26, 2023Updated 2 years ago
- A text compressor based on the PAQ architecture.☆21Sep 12, 2025Updated 5 months ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆20Oct 30, 2018Updated 7 years ago
- A small Linux sandbox☆18Nov 9, 2025Updated 3 months ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- ☆22Jun 24, 2019Updated 6 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Zig's ELF parser utility☆28Jun 15, 2025Updated 8 months ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja☆54Jan 25, 2024Updated 2 years ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆90Jan 17, 2019Updated 7 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- simple wget in zig without libc☆23Oct 28, 2025Updated 3 months ago
- Peephole optimizer for QBE☆32Sep 1, 2025Updated 5 months ago
- David Canright's tiny AES S-boxes☆28Aug 18, 2014Updated 11 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65May 12, 2023Updated 2 years ago
- CVE-2018-4087 PoC☆59Feb 18, 2019Updated 6 years ago
- A library of optimized math functions targeted at 32-bit and 64-bit x86 Linux systems☆28Apr 11, 2016Updated 9 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆38Mar 26, 2022Updated 3 years ago
- A single header string library for microcontrollers - printf, json, etc☆35Jan 2, 2025Updated last year
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 8 years ago