debriefff / AESLinks
Implementation of Rijndael cipher algorithm
☆44Updated last year
Alternatives and similar repositories for AES
Users that are interested in AES are comparing it to the libraries listed below
Sorting:
- A pure Python implementation of AES☆201Updated 4 years ago
- A Python implementation of the block cipher IDEA☆15Updated 7 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆45Updated 7 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆21Updated 5 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Updated 6 years ago
- Correlation Power Analysis☆13Updated 6 years ago
- Attempt for a cross platform AES-GCM encryption☆44Updated 4 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 3 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Updated 7 years ago
- Cache side-channel attack AES android☆12Updated 7 years ago
- Implicit White-box Implementations of ARX Ciphers☆14Updated 2 years ago
- ☆11Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Updated 6 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Updated 6 years ago
- ☆15Updated 4 years ago
- Side Channels Analysis and Deep Learning☆213Updated 2 years ago
- ☆77Updated 7 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- Python implementation of the elgamal crypto system☆71Updated 5 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 6 years ago
- Implementation for Chinese National Standard Ciphers☆43Updated 12 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆64Updated 9 years ago
- Differential Address Trace Analysis☆57Updated last year
- DES algorithm implementation in C☆79Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆62Updated 7 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- pure-python ECDSA signature/verification and ECDH key agreement☆949Updated 4 months ago
- Implementations of the Simon and Speck Block Ciphers☆102Updated 7 years ago
- White-box Analysis and Implementation Tools☆74Updated 3 years ago