An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆26Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for first-order-dpa
Users that are interested in first-order-dpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆70May 31, 2016Updated 9 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- A definitive guide to build Tensorflow with Intel MKL support on Mac☆16Mar 28, 2018Updated 8 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Optimized tensorflow wheels binaries build for macos☆13Jul 19, 2018Updated 7 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- Atmel AVR simulator written in x86 assembly☆15Nov 29, 2024Updated last year
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple example of separate rotation of 3d objects with using Kivy☆18Jun 24, 2013Updated 12 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- A multiplexer for TikZ Circuits☆14Jul 29, 2015Updated 10 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- Algebraic + neural differential cryptanalysis of reduced-round KeeLoq (2026 modernization of a 2015 SAT-only effort). Full 64-bit key rec…☆11Apr 23, 2026Updated 2 weeks ago
- Using C++ Qt, PyQt and PySide☆18Mar 1, 2014Updated 12 years ago
- Infinite space to explore with a space ship on a HTML5 Canvas.☆17Dec 1, 2018Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Online audio file mastering analyzer☆12Aug 30, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- julia interface for accessing Qt via PyCall and PySide☆18Aug 15, 2015Updated 10 years ago
- buzzword-powered blackjack game☆12Jan 21, 2009Updated 17 years ago
- A set of tools for dealing with point clouds representing a forest. Basic object recognition and extraction, calculation of spatial and s…☆12May 18, 2017Updated 8 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago