X3NNY / chipwhisperer-cnView external linksLinks
侧信道攻击学习笔记
☆31Dec 29, 2022Updated 3 years ago
Alternatives and similar repositories for chipwhisperer-cn
Users that are interested in chipwhisperer-cn are comparing it to the libraries listed below
Sorting:
- all of CTF☆40Jan 24, 2022Updated 4 years ago
- An implementation of RSA extending Wiener attack☆16Dec 28, 2021Updated 4 years ago
- distorm3☆12Jun 16, 2012Updated 13 years ago
- Go安全的学习中ing☆17Jan 9, 2023Updated 3 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- ☆35May 26, 2023Updated 2 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- 一个python3实现的base92编码python库 A python library to create base92 encoded strings in python3.☆21Sep 12, 2024Updated last year
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆329Updated this week
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- 个人学习逆向的代码存档☆26Oct 6, 2023Updated 2 years ago
- 2023 陇剑杯 线上初赛附件☆32Aug 30, 2024Updated last year
- Bringing the power of SageMath to VS Code with this extension that offers specialized syntax highlighting, quick run capabilities, and ad…☆49Jan 20, 2026Updated 3 weeks ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- Read PNG headers, Check CRC☆42Dec 10, 2019Updated 6 years ago
- Japanese Kana Loop Exercise - 五十音魔鬼训练~☆12Aug 16, 2025Updated 6 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 2 months ago
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- A KV storage engine based on LSM Tree, supporting Redis RESP☆25Sep 14, 2025Updated 5 months ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 3 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 6 years ago
- Virtual machine configuration for CTF☆38Mar 28, 2021Updated 4 years ago
- 实时图床的图像爬取脚本☆12Nov 28, 2023Updated 2 years ago
- CTF writeups☆16Nov 25, 2025Updated 2 months ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A proc-macro to render text to raw image at compile time☆12Oct 2, 2024Updated last year
- JS implementation of Unity AssetBundle unpacking☆14Oct 19, 2025Updated 3 months ago
- Matlab/Octave toolbox for Rolling Guidance Filter.☆10Nov 29, 2015Updated 10 years ago
- Mihomo任意文件写,可通过写SSH密钥、cron任务等实现RCE☆13May 21, 2025Updated 8 months ago
- 西电计科网络方向应用密码学与网络安全随课实验☆15Feb 26, 2025Updated 11 months ago
- My Emacs configuration☆13Jun 30, 2024Updated last year
- A CLI tool for query keyword in China MIIT ICP Website to get ICP Record☆16Jan 18, 2026Updated 3 weeks ago
- 现代编程思想公开课课后练习☆10Jul 4, 2024Updated last year
- ☆42Aug 29, 2022Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Mar 2, 2023Updated 2 years ago