c3ai-lab / Intel-SGX-Crypto-DemoView external linksLinks
☆19Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for Intel-SGX-Crypto-Demo
Users that are interested in Intel-SGX-Crypto-Demo are comparing it to the libraries listed below
Sorting:
- Ratel - a new framework for instruction-level interposition on enclaved applications☆25Dec 14, 2022Updated 3 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- SGX-LKL Library OS for running Linux applications inside of Intel SGX enclaves☆270Dec 25, 2022Updated 3 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- RTSA-API-Samples☆12Jun 4, 2025Updated 8 months ago
- sgx-based encrypted deduplication prototype☆14May 14, 2021Updated 4 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated 3 weeks ago
- IoT operating system for microcontrollers.☆12Jul 3, 2023Updated 2 years ago
- Record some of my tools, not limited to language☆12Jan 3, 2016Updated 10 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- Tool used to create ADI Kuiper Linux userspace images☆18Updated this week
- Images of Teardowns (CC BY licensed)☆12Jul 7, 2021Updated 4 years ago
- ☆12Apr 19, 2020Updated 5 years ago
- ☆11Feb 22, 2016Updated 9 years ago
- EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware☆14Dec 13, 2022Updated 3 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated 2 weeks ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆12Apr 9, 2022Updated 3 years ago
- C# .Net Standard 2.0 wrapper for the ApexCharts Javascript Library - https://apexcharts.com☆14Dec 8, 2022Updated 3 years ago
- ☆18Nov 26, 2025Updated 2 months ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated 11 months ago
- Container building stuff☆15Nov 7, 2025Updated 3 months ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 5 months ago
- ☆12Jul 13, 2018Updated 7 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆17Mar 15, 2024Updated last year
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago