A cryptographic method that defends against side-channel attacks
☆25Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for ctx
Users that are interested in ctx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated 2 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- CATBench, the Intel Cache Allocation Technology benchmarking suite described in our tech report, "Simple Cache Partitioning for Networked…☆12Oct 6, 2017Updated 8 years ago
- A website for a blockchain course☆13Apr 1, 2022Updated 4 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- A low-level client for accessing DynamoDB from node.js☆27Jul 6, 2018Updated 7 years ago
- pivottablejs for air-gapped systems☆13Aug 14, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 12 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- An exploration of how to create a simple "bank" in the UK in c. 2014☆15Jul 3, 2014Updated 11 years ago
- Read and decode RTSP video streams using FFMPEG and publish them as ROS images☆10Feb 24, 2021Updated 5 years ago
- C version of the MetroHash function☆28Jun 8, 2015Updated 10 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- [IEEE TSIPN' 2022] "Scalable Perception-Action-Communication Loops with Convolutional and Graph Neural Networks", by Ting-Kuei Hu, Fernan…☆15Feb 4, 2022Updated 4 years ago
- An Empirical Analysis of Gradient Descent Optimization in Policy Gradient Methods - EWRL Workshop 2018☆15Oct 28, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- ☆17Sep 22, 2016Updated 9 years ago
- 🌃 Start and control a Tor instance.☆13Apr 9, 2022Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Jun 5, 2019Updated 6 years ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- This project implenments the OSPF using Dijkstra algorithm (Open Shortest Path First) network protocol in python. Link-State Routing pr…☆12Sep 1, 2017Updated 8 years ago
- ☆28Nov 21, 2021Updated 4 years ago
- Panorama stitching of images or real-time video streams☆10Aug 12, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago
- A fast, sharded key-value store, based on RocksDB.☆15Mar 18, 2018Updated 8 years ago
- BU related toolbox☆11Apr 4, 2017Updated 9 years ago
- A high-level wrapper around BCoin☆25Dec 22, 2015Updated 10 years ago
- Please see the paper "COLORIS: A Dynamic Cache Partitioning System Using Page Coloring" for details.☆17May 9, 2017Updated 8 years ago
- ☆11Nov 8, 2017Updated 8 years ago
- Full implementation of SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets.☆13Feb 23, 2026Updated 2 months ago