Ledger-Donjon / lascarLinks
Ledger's Advanced Side-Channel Analysis Repository
☆401Updated 2 years ago
Alternatives and similar repositories for lascar
Users that are interested in lascar are comparing it to the libraries listed below
Sorting:
- Radio Side-Channels in Mixed-Signal Chips☆152Updated 6 months ago
- Side-channel toolkit in Julia☆167Updated 3 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆294Updated 4 years ago
- ☆238Updated last year
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Updated 5 years ago
- Constant-Time Toolkit☆300Updated 7 years ago
- ☆152Updated 7 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆69Updated 3 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆103Updated 3 weeks ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆66Updated last month
- Repository of various public white-box cryptographic implementations and their practical attacks.☆666Updated last year
- A practical attack framework for precise enclave execution control☆466Updated last month
- The code to the SGX-ROP paper☆185Updated 5 years ago
- Understand and mitigate software-observable side-channels☆505Updated 5 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆192Updated 4 months ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆67Updated 9 years ago
- ☆197Updated last year
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 8 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Updated last month
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago
- Side-Channel Analysis Library☆105Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept☆534Updated 5 years ago
- ☆185Updated 4 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆193Updated 8 years ago
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆326Updated 8 months ago
- ☆472Updated last year