A cryptographic method that defends against side-channel attacks
☆25Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for ctx
Users that are interested in ctx are comparing it to the libraries listed below
Sorting:
- Static Analysis for Detecting Side-Channel Vulnerabilities in PHP applications (Work-In-Progress)☆16Jul 25, 2017Updated 8 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated last year
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Churros is a Javascript library for sycing a local HTML 5 Web SQL Database with your server's database.☆13Feb 27, 2011Updated 15 years ago
- CATBench, the Intel Cache Allocation Technology benchmarking suite described in our tech report, "Simple Cache Partitioning for Networked…☆12Oct 6, 2017Updated 8 years ago
- A website for a blockchain course☆12Apr 1, 2022Updated 3 years ago
- FIPS-204 (ML-DSA) implementation in Go☆19Feb 13, 2026Updated last month
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- pivottablejs for air-gapped systems☆13Aug 14, 2024Updated last year
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- C version of the MetroHash function☆27Jun 8, 2015Updated 10 years ago
- Utilities for working with videos☆13Jul 5, 2025Updated 8 months ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- An Empirical Analysis of Gradient Descent Optimization in Policy Gradient Methods - EWRL Workshop 2018☆15Oct 28, 2018Updated 7 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- ☆17Sep 22, 2016Updated 9 years ago
- 🌃 Start and control a Tor instance.☆12Apr 9, 2022Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Jun 5, 2019Updated 6 years ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- This project implenments the OSPF using Dijkstra algorithm (Open Shortest Path First) network protocol in python. Link-State Routing pr…☆12Sep 1, 2017Updated 8 years ago
- ☆28Nov 21, 2021Updated 4 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Panorama stitching of images or real-time video streams☆10Aug 12, 2020Updated 5 years ago
- A fast, sharded key-value store, based on RocksDB.☆15Mar 18, 2018Updated 8 years ago
- Low Code Editor☆13Dec 4, 2024Updated last year
- Full implementation of SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets.☆13Feb 23, 2026Updated 3 weeks ago
- ☆11Nov 8, 2017Updated 8 years ago
- Data encryption with symmetric cryptographic keys or passwords/passphrases, and self-contained encryption metadata☆25Apr 13, 2025Updated 11 months ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- a demo to transport video by UDP☆12Jan 30, 2019Updated 7 years ago