PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistical Analysis
☆43Apr 20, 2026Updated last month
Alternatives and similar repositories for PROLEAD
Users that are interested in PROLEAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SILVER - Statistical Independence and Leakage Verification☆16Jun 6, 2025Updated 11 months ago
- Side-Channel Analysis Library☆112Apr 10, 2026Updated last month
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆23Feb 13, 2020Updated 6 years ago
- ☆55May 13, 2024Updated 2 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Present Crypto Engine in Verilog☆12Feb 27, 2016Updated 10 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆35Aug 29, 2023Updated 2 years ago
- ☆14Jun 22, 2019Updated 6 years ago
- A script for scraping and storing cargo crates☆18Feb 15, 2026Updated 3 months ago
- MIRAGE (USENIX Security 2021)☆14Nov 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated last year
- Minimal RISC-V Chisel design strictly reflecting the ISA document for verification.☆20Apr 14, 2026Updated last month
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- OpenTitan FI formal verification framework☆16Aug 29, 2023Updated 2 years ago
- ☆11Dec 31, 2019Updated 6 years ago
- A light-weight hardware oriented synchronous stream cipher.☆12Mar 19, 2022Updated 4 years ago
- A module for nix-darwin to set custom icons for your applications☆18Jun 22, 2024Updated last year
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆19Nov 14, 2022Updated 3 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Generate symbols from HDL components/modules☆22Feb 6, 2023Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Nov 26, 2024Updated last year
- ☆17May 26, 2020Updated 5 years ago
- Hardware Implementation of Sigmoid Function using verilog HDL☆16Dec 16, 2019Updated 6 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆39Aug 6, 2024Updated last year
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Multi Layer Perceptron by Vivado HLS for Xilinx FPGA implementation☆12Dec 26, 2016Updated 9 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 4 years ago
- Game in Haskell☆15Apr 30, 2026Updated 2 weeks ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- the released codes for DiamondGAN - a scalable multiple-to-one domain translation approach in medical imaging☆12Jan 16, 2020Updated 6 years ago
- Header only C++ implementation of the Wasserstein distance (or earth mover's distance)☆15Nov 13, 2020Updated 5 years ago