Glank / Galois
Galois field math objects for Python
☆29Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Galois
- ☆14Updated 4 years ago
- ☆19Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 4 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Updated 5 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 8 months ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆37Updated last month
- Finite field math in python including generic matrix operations and Reed-Solomon error correcting codes.☆63Updated 2 years ago
- Frobenius Additive Fourier Transform☆12Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Tracing framework for full system simulators☆54Updated 9 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Updated 11 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 3 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- DFA scripts using Jlsca☆10Updated 5 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆30Updated 2 years ago
- ☆12Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- White-box cryptography based on FAPKC algorithm☆26Updated 3 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆28Updated 4 years ago
- Implementation of cryptographic program obfuscation☆41Updated 6 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- A library for performing memory forensics over the IEEE 1394 interface.☆18Updated 6 years ago
- Differential Address Trace Analysis☆54Updated 7 months ago
- SCALE: Side-Channel Attack Lab. Exercises☆41Updated last year
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆46Updated 4 years ago