Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and had many advantages compared to the other methods. A comprehensive study of deep learning algorithms when applied in the context of side-channel analysis and we discuss the links with the classical template att…
☆14Mar 13, 2019Updated 6 years ago
Alternatives and similar repositories for DeepLearning_SCA_ASCAD
Users that are interested in DeepLearning_SCA_ASCAD are comparing it to the libraries listed below
Sorting:
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆12Jun 24, 2021Updated 4 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- Side Channels Analysis and Deep Learning☆229Dec 31, 2025Updated 2 months ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 6 months ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Apr 22, 2022Updated 3 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- Code for the project☆22Mar 23, 2021Updated 4 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Nov 30, 2021Updated 4 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- ☆44Jun 27, 2022Updated 3 years ago
- Synthesiser for Asynchronous Verilog Language☆20Oct 29, 2014Updated 11 years ago
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- A python program to build ResNet-1D model and DRSN-1D model in keras environment.☆11Mar 29, 2023Updated 2 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- C++ 实现银行排队服务模拟☆10Feb 13, 2017Updated 9 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- c++的一些基础知识总结☆10Oct 28, 2020Updated 5 years ago
- manage my star project on github☆11Jul 23, 2020Updated 5 years ago
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- 电商库存服务中实现缓存+数据库双写一致性保障方案☆12Jan 17, 2019Updated 7 years ago
- A Single-path Delay Feedback FFT Generator☆13Mar 20, 2024Updated last year
- 100.000 links, 50.000 artworks dataset. Includes source code that used to scrape data.☆10May 29, 2021Updated 4 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/jbirch☆12Sep 6, 2022Updated 3 years ago
- 2018/2019/校招/春招/秋招/自然语言处理(NLP)/深度学习(Deep Learning)/机器学习(Machine Learning)/C/C++/Python/面试笔记☆11Aug 13, 2018Updated 7 years ago
- A tool for estimating a system's information leakage via Machine Learning☆10Jun 28, 2024Updated last year
- ☆11May 21, 2020Updated 5 years ago
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆17Dec 10, 2024Updated last year
- ☆13Feb 8, 2022Updated 4 years ago
- GitHub for the article Pseudo Random Number Generation through Reinforcement Learning and Recurrent Neural Networks (Luca Pasqualini and …☆11Feb 18, 2021Updated 5 years ago
- 使用verilog实现流水线 FFT☆14Jul 1, 2024Updated last year
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 7 years ago