alexandru-dinu / bleichenbacherView external linksLinks
Bleichenbacher's PKCS 1.5 Padding Oracle Attack.
☆16Mar 7, 2021Updated 4 years ago
Alternatives and similar repositories for bleichenbacher
Users that are interested in bleichenbacher are comparing it to the libraries listed below
Sorting:
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- CTF Write-Ups☆19Jan 19, 2020Updated 6 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 7 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- Discover the China's map deviation algorithm☆11Jun 30, 2025Updated 7 months ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 8 months ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- ☆13Oct 1, 2020Updated 5 years ago
- ☆19Mar 23, 2025Updated 10 months ago
- ☆13May 26, 2022Updated 3 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 5 months ago
- An advanced botting app that makes minecraft and discord bot and lets u control them as well as manage them while hosting them on your pc☆15Mar 1, 2023Updated 2 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- prime+probe code targeting a given physical address on libgcrypt run in an SGX enclave☆15Dec 6, 2018Updated 7 years ago
- Intelligent invoices with LaTeX3☆18Sep 24, 2018Updated 7 years ago
- ☆17Feb 16, 2017Updated 9 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Creating Markov chain-generated Hacker News headlines with Python☆12Aug 24, 2015Updated 10 years ago
- This one is a very simple but cool project, something that I would recommend to anyone who is interested into DIY electronics, gadgets an…☆20Sep 8, 2017Updated 8 years ago
- MATLAB scripts for efficient template attacks☆14Apr 20, 2018Updated 7 years ago
- Uart c++ class for Nvidia Jetson Nano☆12Nov 13, 2020Updated 5 years ago
- Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"☆13Aug 27, 2020Updated 5 years ago
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- C# 10 Features in one console application☆12May 27, 2021Updated 4 years ago
- Override Character Encoding extension for Firefox☆17Apr 19, 2025Updated 9 months ago
- Minimal pure-Python implementation of Shamir's secret sharing scheme.☆15Oct 19, 2025Updated 3 months ago
- ☆22Jan 21, 2019Updated 7 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- A simple and very light Neovim bufferline☆15Nov 19, 2025Updated 2 months ago
- ☆15Mar 14, 2023Updated 2 years ago
- Yet another list of ML resources☆24Mar 27, 2025Updated 10 months ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- 北京邮电大学校园网接入服务使用说明,a.k.a. nic.bupt.edu.cn 补完计划☆18Apr 13, 2022Updated 3 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Apr 14, 2025Updated 10 months ago
- simple command line for various AWS management tasks☆23Dec 4, 2025Updated 2 months ago
- Javascript bookmarklet to reveal actual RSS URL on a iTunes podcast page☆17Dec 11, 2012Updated 13 years ago