debriefff / AESLinks
Implementation of Rijndael cipher algorithm
☆45Updated last year
Alternatives and similar repositories for AES
Users that are interested in AES are comparing it to the libraries listed below
Sorting:
- A pure Python implementation of AES☆204Updated 4 years ago
- A Python implementation of the block cipher IDEA☆15Updated 7 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆25Updated 2 years ago
- A python implementation of the SP800-22 Rev 1a PRNG test suite.☆162Updated 4 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Updated 6 years ago
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- DES algorithm implementation in C☆79Updated 5 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Updated 7 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Updated 8 years ago
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆76Updated 6 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆23Updated 8 years ago
- Post-quantum Cryptography LWE (Learning with Errors) Library☆57Updated 2 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆21Updated 5 years ago
- IDEA cryptography algorithm☆10Updated 5 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- pure-python ECDSA signature/verification and ECDH key agreement☆955Updated last month
- Simple sniffer using scapy and PyQt5 on Windows 10☆67Updated 3 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆46Updated 8 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- Some demo for template side channel attacks☆13Updated 4 years ago
- ☆23Updated 5 years ago
- Pure Python implementation of SHA2 (i.e., SHA224, SHA256, SHA384, and SHA512).☆56Updated 3 weeks ago
- A Python implementation of the non_iid tests in SP800-90B.☆13Updated 4 years ago
- Simple implementation of the RSA algorithm☆161Updated 6 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- Finite field math in python including generic matrix operations and Reed-Solomon error correcting codes.☆65Updated 2 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- NIST Statistical Test Suite (SP800-22rev1) source code for easier compilation.☆44Updated 3 years ago