GaPhil / dpaLinks
Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys
☆12Updated 7 years ago
Alternatives and similar repositories for dpa
Users that are interested in dpa are comparing it to the libraries listed below
Sorting:
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆23Updated 7 years ago
- ☆23Updated 5 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆63Updated 9 years ago
- ☆50Updated last year
- ☆11Updated 4 years ago
- ☆10Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 6 years ago
- ☆11Updated 5 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆14Updated 4 years ago
- Side-Channel Analysis Library☆92Updated this week
- This is a project in which side-channel attacks are researched and developed.☆46Updated 5 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆22Updated 8 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Updated 7 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 3 years ago
- ☆17Updated 7 years ago
- Research code to perform AES timing attacks circa 2006☆15Updated 11 years ago
- ☆19Updated 4 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆30Updated 2 years ago
- Some demo for template side channel attacks☆11Updated 4 years ago
- ☆10Updated 5 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆24Updated 6 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 5 months ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆9Updated 8 months ago
- ☆17Updated 6 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Updated 11 years ago
- Tools for studying S-boxes☆37Updated last month