bozhu / AES-GCM-PythonLinks
A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆46Updated 8 years ago
Alternatives and similar repositories for AES-GCM-Python
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
Sorting:
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated 2 years ago
- White-box Analysis and Implementation Tools☆77Updated 3 years ago
- Using SGX to harden password hashing☆34Updated 9 years ago
- PyCryptoPlus: a pycrypto extension written 100% in Python☆76Updated 8 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- ☆11Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- ☆20Updated 5 years ago
- A python implementation of the block cipher RC4☆41Updated 7 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆40Updated 3 years ago
- ☆77Updated 7 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆68Updated 2 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- AES on CUDA☆27Updated 16 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- This repository contains examples of Flush+Flush cache attacks☆167Updated 4 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Pure python, slow and standard implementation of PKCS #1 also knows as RSA☆31Updated 2 years ago
- ☆152Updated 7 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- Deep learning side channel privileged memory reader☆45Updated 7 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago