cedi / DiffieHellman
Simple Diffie Hellman Implementation using RAW-Sockets for communication
☆9Updated 8 years ago
Alternatives and similar repositories for DiffieHellman:
Users that are interested in DiffieHellman are comparing it to the libraries listed below
- ☆11Updated 9 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆41Updated 7 years ago
- Framework for building transparent memory encryption and authentication solutions☆26Updated 6 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Updated 4 years ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- ☆26Updated 6 years ago
- Phishing detection using GNNs☆12Updated 11 months ago
- DDoS Project with Detection☆32Updated 9 years ago
- ☆183Updated 7 months ago
- DNS tunneling implemented in Python☆13Updated last year
- CRIME attack PoC : a compression oracle attacks CVE-2012-4929☆27Updated 5 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆18Updated 5 years ago
- A small collection of scripts that I've written for various needs.☆28Updated 3 months ago
- Dilithium is a digital signature scheme that is strongly secure under chosen message attacks based on the hardness of lattice problems ov…☆13Updated last year
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆61Updated 8 years ago
- ☆11Updated 6 years ago
- ☆48Updated 7 years ago
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆167Updated last year
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆22Updated 7 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- hardware security course from Coursera and University of Maryland☆27Updated 9 years ago
- Verilog Implementation of modular exponentiation using Montgomery multiplication☆32Updated 10 years ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆176Updated 7 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Updated 5 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆58Updated 4 years ago
- Deep Learning for Domain Name System☆19Updated 3 years ago
- This is a project in which side-channel attacks are researched and developed.☆39Updated 4 years ago