CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)
☆24Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for aes-cpa
Users that are interested in aes-cpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Feb 13, 2021Updated 5 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- (Neo)Vim plugin to navigate todos in Go projects with ease☆15Jan 22, 2019Updated 7 years ago
- This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do d…☆17Jul 18, 2019Updated 6 years ago
- ☆14Dec 14, 2020Updated 5 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 7 years ago
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆334Feb 25, 2026Updated last month
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- ☆11Sep 22, 2017Updated 8 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- OneWire lets you access 1-wire devices made by Maxim/Dallas, such as temperature sensors and ibutton secure memory. Library for arduino☆16Mar 17, 2013Updated 13 years ago
- Exploring synthetic aperture radar imaging by building real hardware☆13Mar 2, 2022Updated 4 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- a modular malware framework written in golang☆11May 6, 2019Updated 6 years ago
- Fast constant-time AES implementations on 32-bit architectures☆70Oct 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- ☆17Mar 16, 2026Updated last week
- Forked from http://git.osmocom.org/osmo-fl2k . Turns FL2000-based USB 3.0 to VGA adapters into low cost DACs.☆16Jan 27, 2021Updated 5 years ago
- AES encryption implementation for AVR in assembly☆22Mar 5, 2016Updated 10 years ago
- ☆15Oct 25, 2024Updated last year
- Dual RISC-V DISC with integrated eFPGA☆18Oct 9, 2021Updated 4 years ago
- Experiment with Laser Cube☆10Jul 3, 2021Updated 4 years ago
- Source code for the HorrorScope and material for the ScaCheapier workshop☆25Dec 24, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Feb 5, 2024Updated 2 years ago
- Some papers and exploit writeups about WebKit.☆20Feb 18, 2024Updated 2 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- ☆17Mar 7, 2023Updated 3 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆12Jul 2, 2021Updated 4 years ago
- Glitching an STM32F103☆14Jun 11, 2018Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago