Chair-for-Security-Engineering / VERICALinks
☆17Updated 6 months ago
Alternatives and similar repositories for VERICA
Users that are interested in VERICA are comparing it to the libraries listed below
Sorting:
- Side-Channel Analysis Library☆105Updated 4 months ago
- ☆23Updated 5 years ago
- ☆53Updated last year
- Side Channels Analysis and Deep Learning☆224Updated 2 weeks ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 9 years ago
- Masked Hardware AES with HPC☆16Updated 2 months ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- SILVER - Statistical Independence and Leakage Verification☆14Updated 7 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Updated last month
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆41Updated last week
- ☆10Updated 5 years ago
- prime+probe code targeting a given physical address on libgcrypt run in an SGX enclave☆15Updated 7 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆72Updated 3 years ago
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated last week
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆31Updated 2 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Updated 5 years ago
- The MIT Sanctum processor top-level project☆31Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 8 years ago
- ☆12Updated 4 years ago
- Cryptanalysis of Physically Unclonable Functions☆91Updated last year
- This repository contains several tools to perform Cache Template Attacks☆164Updated 2 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆35Updated last year
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Updated 2 years ago
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Updated 5 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆76Updated 2 months ago
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆38Updated 5 years ago
- Research code to perform AES timing attacks circa 2006☆15Updated 11 years ago