侧信道攻击学习笔记
☆31Dec 29, 2022Updated 3 years ago
Alternatives and similar repositories for chipwhisperer-cn
Users that are interested in chipwhisperer-cn are comparing it to the libraries listed below
Sorting:
- all of CTF☆40Jan 24, 2022Updated 4 years ago
- An implementation of RSA extending Wiener attack☆16Dec 28, 2021Updated 4 years ago
- Go安全的学习中ing☆17Jan 9, 2023Updated 3 years ago
- distorm3☆12Jun 16, 2012Updated 13 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- ☆37Sep 18, 2023Updated 2 years ago
- 一个python3实现的base92编码python库 A python library to create base92 encoded strings in python3.☆21Sep 12, 2024Updated last year
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- 个人学习逆向的代码存档☆26Oct 6, 2023Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- 2023 陇剑杯 线上初赛附件☆32Aug 30, 2024Updated last year
- A expand mod for Terraria Calamity Mod on 1.4.4.9☆18Updated this week
- 全国大学生信息安全竞赛决赛web4,SSTI+TensorFlow模型☆28Jul 26, 2019Updated 6 years ago
- Japanese Kana Loop Exercise - 五十音魔鬼训练~☆12Aug 16, 2025Updated 6 months ago
- Read PNG headers, Check CRC☆41Dec 10, 2019Updated 6 years ago
- HnuSec 海南大学网安实验室☆13Jan 30, 2024Updated 2 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 3 months ago
- Experimental DUML client written in java. Licensed under GPLv3☆14Jan 7, 2018Updated 8 years ago
- ☆16Oct 29, 2023Updated 2 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 6 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- 现代编程思想公开课课后练习☆10Jul 4, 2024Updated last year
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 4 years ago
- CTF writeups☆16Nov 25, 2025Updated 3 months ago
- 一个高效多线程,插件化的web敏感信息收集器☆10Mar 25, 2024Updated last year
- A KV storage engine based on LSM Tree, supporting Redis RESP☆31Sep 14, 2025Updated 5 months ago
- 实时图床的图像爬取脚本☆12Nov 28, 2023Updated 2 years ago
- My Emacs configuration☆13Jun 30, 2024Updated last year
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Matlab/Octave toolbox for Rolling Guidance Filter.☆10Nov 29, 2015Updated 10 years ago
- JS implementation of Unity AssetBundle unpacking☆15Feb 19, 2026Updated 2 weeks ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- A CLI tool for query keyword in China MIIT ICP Website to get ICP Record☆16Jan 18, 2026Updated last month
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago