Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128
☆12Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for tvla
Users that are interested in tvla are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- MATLAB scripts for efficient template attacks☆15Apr 20, 2018Updated 7 years ago
- ☆14Dec 7, 2015Updated 10 years ago
- A python tool to dissect various BLE GATT packets for replay and analysis.☆13Dec 29, 2019Updated 6 years ago
- ☆11Jan 7, 2018Updated 8 years ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- LLM驱动的社交网络模拟系统; LLM-driven social network simulation system☆10Oct 13, 2024Updated last year
- Verilog bit slicing for python☆11May 13, 2021Updated 4 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- [ICLR 2025] RaSA: Rank-Sharing Low-Rank Adaptation☆10May 19, 2025Updated 10 months ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- Badge for Labortage 2021☆12Dec 27, 2023Updated 2 years ago
- ChipWhisperer CW308 UFO Target Hardware Files☆41Aug 13, 2025Updated 7 months ago
- Code for the paper "Jailbreak Large Vision-Language Models Through Multi-Modal Linkage"☆28Dec 6, 2024Updated last year
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Emscripten port of CPython☆23Feb 1, 2016Updated 10 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 9 months ago
- [CVPR 2025] Official implementation for JOOD "Playing the Fool: Jailbreaking LLMs and Multimodal LLMs with Out-of-Distribution Strategy"☆22Jun 11, 2025Updated 9 months ago
- ☆12Jun 22, 2021Updated 4 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- An extention of pytorch for low precision training / inference☆10Aug 28, 2023Updated 2 years ago
- 2021 Linux.conf.au Swag Badge☆11Jan 22, 2022Updated 4 years ago
- ☆12Dec 26, 2024Updated last year
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- ☆13May 26, 2022Updated 3 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year
- [2025 NeurlPS Spotlight] MetaMind: Modeling Human Social Thoughts with Metacognitive Multi-Agent Systems☆72Aug 19, 2025Updated 7 months ago
- ☆21Oct 2, 2024Updated last year
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- hardware (ASIC) DEFLATE designed for low-latency page-granularity memory compression and implemented in Chisel☆16Nov 15, 2024Updated last year
- Conversione BLV a Voron☆15Mar 1, 2024Updated 2 years ago
- This one is a very simple but cool project, something that I would recommend to anyone who is interested into DIY electronics, gadgets an…☆20Sep 8, 2017Updated 8 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago