dj-on-github / djenrandomLinks
A C program to generate random data using several random models, with parameterized non uniformities and flexible output formats.
☆29Updated 2 weeks ago
Alternatives and similar repositories for djenrandom
Users that are interested in djenrandom are comparing it to the libraries listed below
Sorting:
- A python implementation of the SP800-22 Rev 1a PRNG test suite.☆162Updated 4 years ago
- NIST Statistical Test Suite (SP800-22rev1) source code for easier compilation.☆43Updated 3 years ago
- High-order countermeasures for AES and DES☆25Updated 10 months ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 5 years ago
- A reimplementation of the Fourmilab/John Walker random number test program ent with several improvements.☆14Updated 9 months ago
- The SP800-90B_EntropyAssessment C++package implements the min-entropy assessment methods included in Special Publication 800-90B.☆217Updated last month
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- This is a project in which side-channel attacks are researched and developed.☆46Updated 5 years ago
- Improved version of the NIST Statistical Test Suite (STS)☆101Updated 5 months ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆23Updated 7 years ago
- An Implementation of the Number Theoretic Transform☆48Updated last year
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Updated 5 months ago
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- Circuits and hardware security modules formally verified with Knox 🔐☆23Updated 4 months ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆116Updated 6 years ago
- Teaching materials related to the Tamarin Prover☆69Updated 10 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆74Updated 3 months ago
- The code from NIST SP-800-22 for testing random-number generators, along with docs for reference☆126Updated last year
- Implementations of the Simon and Speck Block Ciphers☆102Updated 6 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆40Updated 8 months ago
- ☆11Updated last year
- Add support for reading and writing of trace set files (.trs) to Python☆23Updated 3 months ago
- ☆10Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆36Updated 3 years ago
- ☆12Updated 5 months ago