☆19Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for VERICA
Users that are interested in VERICA are comparing it to the libraries listed below
Sorting:
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆32Aug 29, 2023Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 3 weeks ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ExtJS component for drawing trees (actually Directed Acyclic Graphs)☆21Aug 16, 2012Updated 13 years ago
- RISC-V Confidential VM Extension☆13Jan 14, 2026Updated last month
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- The VulnCheck Github Action☆13Updated this week
- A semantic web crawler☆20Sep 20, 2010Updated 15 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- ☆17May 27, 2016Updated 9 years ago
- 山东大学自行车协会 历届会刊☆12Apr 8, 2023Updated 2 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 4 months ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- ☆12Nov 2, 2022Updated 3 years ago
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 2 months ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- ☆45Updated this week
- ☆13Feb 8, 2022Updated 4 years ago
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 8 months ago
- Tools for creating binary tarballs☆16Aug 23, 2021Updated 4 years ago
- Keystone security monitor library for opensbi (Discountinued after monorepo-izing)☆13Oct 28, 2022Updated 3 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Aug 28, 2025Updated 6 months ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- MATLAB scripts for efficient template attacks☆14Apr 20, 2018Updated 7 years ago
- ☆16Nov 28, 2024Updated last year
- MultiZone® Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure acce…☆20Jan 22, 2024Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Simple dmenu launcher for passwords, docs, notes and application shortcuts.☆12Jun 8, 2020Updated 5 years ago