An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆26Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for first-order-dpa
Users that are interested in first-order-dpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 5 months ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- (Neo)Vim plugin to navigate todos in Go projects with ease☆15Jan 22, 2019Updated 7 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- Atmel AVR simulator written in x86 assembly☆15Nov 29, 2024Updated last year
- ☆35Aug 29, 2012Updated 13 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- A multiplexer for TikZ Circuits☆14Jul 29, 2015Updated 10 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Online audio file mastering analyzer☆12Aug 30, 2023Updated 2 years ago
- ☆36Jan 13, 2021Updated 5 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- 🎨 A tool program to set terminal colors from image☆10May 3, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Feb 8, 2022Updated 4 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Simultaneous Multithreading (SMT) Manager - enable or disable hyperthreading cores, or display your current CPU topology.☆55Feb 20, 2026Updated last month
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- MATLAB scripts for efficient template attacks☆15Apr 20, 2018Updated 7 years ago