Masked Ascon Software Implementations
☆12May 3, 2022Updated 3 years ago
Alternatives and similar repositories for simpleserial-ascon
Users that are interested in simpleserial-ascon are comparing it to the libraries listed below
Sorting:
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆32Aug 29, 2023Updated 2 years ago
- Hardware Design of Ascon☆38Jan 20, 2026Updated last month
- ☆12Jan 13, 2025Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- ☆54May 13, 2024Updated last year
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆95Oct 19, 2023Updated 2 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- ☆10Sep 10, 2025Updated 5 months ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 2 weeks ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- How to create a Minecraft server using WireGuard & PiVPN!☆14Feb 24, 2025Updated last year
- Python library for Alphanov's PDM laser sources control☆13Updated this week
- A dead simple library to simulate Minecraft biomes in pure Java☆10Jun 15, 2023Updated 2 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 2 weeks ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- Installation program to add Jacksum (CLI) and HashGarten (GUI) to Microsoft Windows. It also adds functions to the Send To menu which is …☆12Dec 1, 2024Updated last year
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Various improvements to voice chat groups.☆13Dec 10, 2025Updated 2 months ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago