Ledger-Donjon / scadlLinks
A tool for side-channel attacks (SCAs) using deep learning (DL)
☆13Updated 3 months ago
Alternatives and similar repositories for scadl
Users that are interested in scadl are comparing it to the libraries listed below
Sorting:
- Python library for Alphanov's PDM laser sources control☆11Updated 5 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆15Updated 4 months ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- ☆12Updated 4 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆61Updated 2 weeks ago
- Donjon hardware tool for circuits security evaluation☆91Updated 2 weeks ago
- Container building stuff☆13Updated 2 months ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 2 years ago
- Side-channel traces visualizer☆15Updated 2 months ago
- Add support for reading and writing of trace set files (.trs) to Python☆23Updated 3 months ago
- ☆23Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- Datasets and code for the paper entitled "Improving CEMA using Correlation Optimization".☆8Updated 6 years ago
- ☆20Updated 3 years ago
- A Python implementation of the NewHope post-quantum cryptographic scheme.☆20Updated 3 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆13Updated last month
- Cross-Domain DPA Attack on SAML11☆16Updated 6 years ago
- DFA scripts using Jlsca☆10Updated 5 years ago
- Companion notebooks to the Hardware Hacking Handbook☆78Updated 3 years ago
- OpenSSF Project Template☆18Updated last year
- masked, bit-sliced AES-128 demo code☆14Updated 6 months ago
- SCARR is a Side-Channel Analysis (SCA) framework☆71Updated last month
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 2 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆22Updated 3 months ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆69Updated this week
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆29Updated 3 years ago
- ☆35Updated last year
- ☆106Updated 2 years ago