Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128
☆12Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for tvla
Users that are interested in tvla are comparing it to the libraries listed below
Sorting:
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- MATLAB scripts for efficient template attacks☆14Apr 20, 2018Updated 7 years ago
- An extention of pytorch for low precision training / inference☆10Aug 28, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Updated this week
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- ☆14Dec 7, 2015Updated 10 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- [ICLR 2025] RaSA: Rank-Sharing Low-Rank Adaptation☆10May 19, 2025Updated 9 months ago
- ☆12Jun 22, 2021Updated 4 years ago
- LLM驱动的社交网络模拟系统; LLM-driven social network simulation system☆10Oct 13, 2024Updated last year
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- A python tool to dissect various BLE GATT packets for replay and analysis.☆13Dec 29, 2019Updated 6 years ago
- ☆12Mar 1, 2023Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 3 months ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 6 months ago
- A sample CLI tool made in V that prints geometric shapes to the screen.☆11Dec 2, 2023Updated 2 years ago
- ☆16Nov 18, 2025Updated 3 months ago
- Conversione BLV a Voron☆15Mar 1, 2024Updated 2 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- ☆10Jul 5, 2016Updated 9 years ago
- Badge for Labortage 2021☆12Dec 27, 2023Updated 2 years ago
- ☆13May 26, 2022Updated 3 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last week
- ☆11Jan 7, 2018Updated 8 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- ☆12Dec 26, 2024Updated last year
- Musictime is popcorntime for music.☆10Sep 6, 2024Updated last year
- Telegram bot to retrieve the menu of the sv restaurant in zug (@FiveMoodsBot )☆10Apr 25, 2023Updated 2 years ago