deep-inder / tvlaLinks
Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128
☆12Updated 4 years ago
Alternatives and similar repositories for tvla
Users that are interested in tvla are comparing it to the libraries listed below
Sorting:
- Side Channels Analysis and Deep Learning☆227Updated 3 weeks ago
- Side-Channel Analysis Library☆105Updated 5 months ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆75Updated 3 years ago
- ☆12Updated 4 years ago
- ☆59Updated 4 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Updated 7 years ago
- DOM Protected Hardware Implementation of AES☆26Updated 9 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Updated 5 years ago
- ☆10Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆31Updated 2 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆40Updated 4 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆43Updated this week
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆185Updated last week
- ☆54Updated last year
- ☆23Updated 5 years ago
- ☆43Updated 3 years ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆12Updated 5 months ago
- ☆27Updated 3 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Updated 3 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆13Updated 3 weeks ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Updated 2 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆391Updated 3 weeks ago
- ☆12Updated 7 years ago
- Masked Hardware AES with HPC☆16Updated 2 months ago
- Parametric NTT/INTT Hardware Generator☆80Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- ☆26Updated 5 years ago
- SILVER - Statistical Independence and Leakage Verification☆14Updated 7 months ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Updated 6 years ago
- ☆19Updated 5 years ago