bozhu / AES-GCM-PythonLinks
A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).
☆46Updated 8 years ago
Alternatives and similar repositories for AES-GCM-Python
Users that are interested in AES-GCM-Python are comparing it to the libraries listed below
Sorting:
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- ☆77Updated 7 years ago
- AES on CUDA☆27Updated 16 years ago
- Tools for "Another Flip in the Wall"☆41Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- White-box Analysis and Implementation Tools☆78Updated 3 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- Deep learning side channel privileged memory reader☆45Updated 7 years ago
- ☆152Updated 7 years ago
- PyCryptoPlus: a pycrypto extension written 100% in Python☆76Updated 9 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆77Updated 6 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Updated 3 years ago
- ☆12Updated 6 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago
- Pure python, slow and standard implementation of PKCS #1 also knows as RSA☆31Updated 2 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- ☆197Updated last year
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- a fully python Diffie-Hellman Library☆52Updated 7 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago