☆19Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for VERICA
Users that are interested in VERICA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- ECM Factorization on CUDA-GPUs☆14Sep 29, 2020Updated 5 years ago
- Contains HDL code for the PQC Key Encapsulation Mechanism BIKE☆22May 5, 2024Updated last year
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last week
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 9 months ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆42Feb 11, 2026Updated last month
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- An automatic recursive function transformer.☆10Aug 12, 2023Updated 2 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- Hardware designs for fault detection☆21Apr 13, 2020Updated 5 years ago
- ☆12Jan 13, 2025Updated last year
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 3 months ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 4 months ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- Protecting Real-Time GPU Kernels on Integrated CPU-GPU SoC Platforms☆12Apr 9, 2018Updated 7 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- 部活用備品管理システム☆14Sep 30, 2018Updated 7 years ago
- Collection of metadata of different Side Channel Attack datasets☆21Jul 4, 2023Updated 2 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- colorscheme☆20Dec 5, 2021Updated 4 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- ☆23Jul 3, 2024Updated last year
- Source code for BiRSwinT: Bilinear Full-Scale Residual Swin-Transformer for Fine-Grained Driver Behavior Recognition☆22Jun 19, 2023Updated 2 years ago
- ExtJS component for drawing trees (actually Directed Acyclic Graphs)☆21Aug 16, 2012Updated 13 years ago
- OpenTitan FI formal verification framework☆16Aug 29, 2023Updated 2 years ago