bozhu / AES-GCM-Python
A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆41Updated 7 years ago
Alternatives and similar repositories for AES-GCM-Python:
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
- ☆12Updated 5 years ago
- ☆19Updated 5 years ago
- masked, bit-sliced AES-128 demo code☆13Updated 2 weeks ago
- SCALE: Side-Channel Attack Lab. Exercises☆41Updated last year
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 5 years ago
- Correlation Power Analysis☆13Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆28Updated 3 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago
- White-box Analysis and Implementation Tools☆73Updated 3 years ago
- ☆21Updated 4 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- Differential fault analysis framework for AES128☆47Updated 11 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆45Updated 6 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆61Updated 8 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆32Updated 4 years ago
- AES on CUDA☆27Updated 15 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated last year
- PyCryptoPlus: a pycrypto extension written 100% in Python☆75Updated 8 years ago
- ☆17Updated 4 months ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆13Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 4 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆48Updated 4 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆27Updated 5 years ago
- Write ups☆16Updated 7 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆34Updated 6 months ago