A free and open source tool for Deep Learning Side Channel Analysis
☆17Oct 31, 2019Updated 6 years ago
Alternatives and similar repositories for DLSCA
Users that are interested in DLSCA are comparing it to the libraries listed below
Sorting:
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 6 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆17May 26, 2020Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Nov 30, 2025Updated 3 months ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Apr 22, 2022Updated 3 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- Side-channel traces visualizer☆16Apr 28, 2025Updated 10 months ago
- ☆13Sep 6, 2021Updated 4 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 2 weeks ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated 3 weeks ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Apr 4, 2018Updated 7 years ago
- A tool for side-channel attacks (SCAs) using deep learning (DL)☆17Apr 1, 2025Updated 11 months ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 3 months ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆91Jan 17, 2019Updated 7 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆107Updated this week
- Side Channels Analysis and Deep Learning☆229Dec 31, 2025Updated 2 months ago
- ☆24Jul 7, 2022Updated 3 years ago
- Open Source Development Course☆25Apr 23, 2022Updated 3 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- ☆23Apr 5, 2025Updated 10 months ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆85Feb 12, 2026Updated 2 weeks ago
- Side-channel analysis setup for OpenTitan☆37Nov 3, 2025Updated 3 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 3 months ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- A tool for secret-shared passphrases.☆14Jan 17, 2022Updated 4 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 3 months ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Python library for Alphanov's PDM laser sources control☆13Updated this week
- ECED440 Computer Security☆11Nov 6, 2024Updated last year