Collection of metadata of different Side Channel Attack datasets
☆21Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for sca-datasets
Users that are interested in sca-datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 31, 2022Updated 3 years ago
- ☆17May 26, 2020Updated 5 years ago
- Datasets from CHES papers on random delays☆14Apr 13, 2021Updated 4 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Automated Generation of Masked Hardware☆19May 7, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- Side Channels Analysis and Deep Learning☆235Dec 31, 2025Updated 3 months ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- ☆44Jun 27, 2022Updated 3 years ago
- ☆33Apr 25, 2023Updated 2 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆194Updated this week
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆45Sep 20, 2023Updated 2 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Side-Channel Analysis Library☆109Updated this week
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 7 years ago
- Header only C++ implementation of the Wasserstein distance (or earth mover's distance)☆15Nov 13, 2020Updated 5 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Nov 30, 2021Updated 4 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- 用OC封装系统提供的接口实现RSA加密、解密、签名、验证☆16Mar 2, 2016Updated 10 years ago
- 部活用備品管理システム☆14Sep 30, 2018Updated 7 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆12Aug 26, 2025Updated 7 months ago
- ☆13Feb 8, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆55May 13, 2024Updated last year
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆34Feb 15, 2025Updated last year
- Java client library for integration with Freja eID☆12Feb 27, 2026Updated last month
- Deep Learning-based Framework for Side-Channel Analysis☆40Apr 22, 2022Updated 3 years ago
- ☆11May 21, 2020Updated 5 years ago
- M1 bare metal project in Rust☆32Sep 1, 2022Updated 3 years ago
- Kernel module that makes it possible to create virtual wifi devices each with a virtualized stack.☆11Dec 13, 2011Updated 14 years ago