PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistical Analysis
☆42Feb 11, 2026Updated last month
Alternatives and similar repositories for PROLEAD
Users that are interested in PROLEAD are comparing it to the libraries listed below
Sorting:
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 9 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last week
- ☆19Jul 17, 2025Updated 8 months ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- ☆23Feb 13, 2020Updated 6 years ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- CPU + xv6 + compiler☆18Feb 7, 2018Updated 8 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- MIRAGE (USENIX Security 2021)☆14Nov 8, 2023Updated 2 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated 11 months ago
- ☆13Feb 8, 2022Updated 4 years ago
- Minimal RISC-V Chisel design strictly reflecting the ISA document for verification.☆19Mar 4, 2026Updated 2 weeks ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- OpenTitan FI formal verification framework☆16Aug 29, 2023Updated 2 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- A light-weight hardware oriented synchronous stream cipher.☆12Mar 19, 2022Updated 4 years ago
- ☆11Dec 31, 2019Updated 6 years ago
- Flexible Open-source workBench fOr Side-channel analysis (FOBOS)☆14Nov 19, 2025Updated 4 months ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- ☆10Aug 22, 2023Updated 2 years ago
- Generate symbols from HDL components/modules☆22Feb 6, 2023Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Nov 26, 2024Updated last year
- ☆17May 26, 2020Updated 5 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- Game in Haskell☆14Mar 5, 2026Updated 2 weeks ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Cross EDA Abstraction and Automation☆41Nov 17, 2025Updated 4 months ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- Standard HyperRAM core for ECP5 written in Litex/Migen☆14Dec 6, 2019Updated 6 years ago
- datasheet generator☆30Jul 18, 2025Updated 8 months ago
- the released codes for DiamondGAN - a scalable multiple-to-one domain translation approach in medical imaging☆12Jan 16, 2020Updated 6 years ago
- ☆13Nov 2, 2023Updated 2 years ago