debriefff / AES
Implementation of Rijndael cipher algorithm
☆46Updated last year
Alternatives and similar repositories for AES:
Users that are interested in AES are comparing it to the libraries listed below
- A pure Python implementation of AES☆201Updated 4 years ago
- Hamming Error Correction Codes (SECDED)☆22Updated 4 years ago
- A Python implementation of the block cipher IDEA☆15Updated 7 years ago
- NIST Statistical Test Suite (SP800-22rev1) source code for easier compilation.☆43Updated 3 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- An open source project for study S-boxes☆40Updated 2 years ago
- ☆18Updated 8 years ago
- Basic but pure DES implementation in Python☆68Updated 6 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- A Python implementation of the non_iid tests in SP800-90B.☆12Updated 3 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆15Updated 5 years ago
- Correlation Power Analysis☆13Updated 6 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆42Updated 7 years ago
- SKINNY tweakable block cipher☆20Updated last year
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆76Updated 5 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Updated 6 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Updated 7 years ago
- DES algorithm implementation in C☆78Updated 4 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆30Updated last year
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆13Updated 4 years ago
- ☆9Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆22Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Side Channels Analysis and Deep Learning☆205Updated 2 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated last year
- The source codes of the SWAN cipher☆11Updated 5 years ago