An attack of the ASCAD dataset in 5 minutes
☆11Sep 3, 2023Updated 2 years ago
Alternatives and similar repositories for ASCAD-5minutes
Users that are interested in ASCAD-5minutes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- String data structures for Rust☆10Apr 13, 2018Updated 7 years ago
- Simple LPC vocoder in Python☆13Jan 7, 2022Updated 4 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An evaluation tool for memory safety sanitizers.☆19Feb 11, 2026Updated last month
- A curated list of awesome side-channel attack resources☆107Nov 23, 2025Updated 4 months ago
- Header only C++ implementation of the Wasserstein distance (or earth mover's distance)☆15Nov 13, 2020Updated 5 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 5 months ago
- 3D Accelerometer 3D Gyroscope 3D Magnetometer☆24Aug 18, 2016Updated 9 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- ☆14Apr 8, 2022Updated 3 years ago
- 部活用備品管理システム☆14Sep 30, 2018Updated 7 years ago
- ☆19Jul 17, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of metadata of different Side Channel Attack datasets☆21Jul 4, 2023Updated 2 years ago
- Flexible Open-source workBench fOr Side-channel analysis (FOBOS)☆14Nov 19, 2025Updated 4 months ago
- DSL for probabilistic models specification and probabilistic programming.☆44Mar 16, 2026Updated last week
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- java实现数字盲水印☆10Dec 16, 2022Updated 3 years ago
- ☆11May 10, 2019Updated 6 years ago
- go library for ChipWhisperer hardware security platform☆21Aug 1, 2019Updated 6 years ago
- colorscheme☆20Dec 5, 2021Updated 4 years ago
- A Heroku buildpack to run TeX Live inside a dyno.☆19Nov 9, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- ☆25Jun 24, 2020Updated 5 years ago
- ECDSA VHDL Implementation☆12Apr 6, 2018Updated 7 years ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- An open source ML system for the end-to-end data science lifecycle☆37Oct 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- Example of an easy way to take cs notes☆11Mar 11, 2021Updated 5 years ago
- ☆52Aug 22, 2023Updated 2 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆33Apr 25, 2023Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year