High-order countermeasures for AES and DES
☆24Aug 1, 2024Updated last year
Alternatives and similar repositories for htable
Users that are interested in htable are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Feb 13, 2020Updated 6 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆71Sep 18, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Nov 26, 2024Updated last year
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆15May 13, 2017Updated 9 years ago
- A fast implementation of the ECMA-182 CRC64 checksum using the CLMUL instruction set☆15Nov 1, 2016Updated 9 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A programming language to write bitsliced ciphers☆61Sep 4, 2024Updated last year
- Differential fault analysis framework for AES128☆49Jul 26, 2013Updated 12 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- ☆16Sep 7, 2020Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Automated Generation of Masked Hardware☆21May 7, 2024Updated 2 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- differential fault analysis attacks (DFA) against SM4☆17Jun 6, 2024Updated last year
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Banquet implementation☆15May 6, 2022Updated 4 years ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆91Jan 17, 2019Updated 7 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 4 years ago
- Repository for the current status of the LESS submission☆13Mar 16, 2026Updated 2 months ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- ☆55May 13, 2024Updated 2 years ago
- (Oblivious) DoH Server☆25Feb 21, 2022Updated 4 years ago
- Your everyday SSH secured serial access☆19May 9, 2026Updated last week
- A powerful and easy to use cross-platform website static generator☆13Jul 25, 2023Updated 2 years ago
- This is only the beginning.☆22Apr 1, 2026Updated last month