Ledger-Donjon / lascar
Ledger's Advanced Side-Channel Analysis Repository
☆380Updated last year
Alternatives and similar repositories for lascar:
Users that are interested in lascar are comparing it to the libraries listed below
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆161Updated 3 years ago
- Side-channel toolkit in Julia☆161Updated 3 years ago
- Constant-Time Toolkit☆295Updated 6 years ago
- Radio Side-Channels in Mixed-Signal Chips☆144Updated 7 months ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆86Updated 2 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆49Updated 5 years ago
- Side-Channel Analysis Library☆78Updated last week
- ☆228Updated 2 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated this week
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆258Updated this week
- Donjon hardware tool for circuits security evaluation☆74Updated last month
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆177Updated 9 months ago
- This repository contains tools to perform modern cache attacks on ARM.☆288Updated 3 years ago
- Understand and mitigate software-observable side-channels☆500Updated 4 years ago
- A practical attack framework for precise enclave execution control☆450Updated last month
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated last year
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- The code to the SGX-ROP paper☆183Updated 4 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆207Updated 4 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆139Updated this week
- This repository contains examples of Flush+Flush cache attacks☆158Updated 3 years ago
- This repository contains several tools to perform Cache Template Attacks☆145Updated last year
- CJAG is an open-source implementation of our cache-based jamming agreement.☆282Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆47Updated 6 years ago
- Source code of the Whitebox Contest Submission Server☆35Updated 7 months ago
- ☆182Updated 4 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆16Updated 5 years ago
- A curated list of awesome side-channel attack resources☆75Updated 11 months ago