An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆26Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for first-order-dpa
Users that are interested in first-order-dpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 5 months ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆53Feb 15, 2020Updated 6 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- (Neo)Vim plugin to navigate todos in Go projects with ease☆15Jan 22, 2019Updated 7 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- A quick version of the keeloq crypto system written in python.☆11Apr 24, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Online audio file mastering analyzer☆12Aug 30, 2023Updated 2 years ago
- ☆12Apr 10, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆36Jan 13, 2021Updated 5 years ago
- 🎨 A tool program to set terminal colors from image☆10May 3, 2017Updated 8 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Simultaneous Multithreading (SMT) Manager - enable or disable hyperthreading cores, or display your current CPU topology.☆55Feb 20, 2026Updated last month
- Project for an RPU RISC-V system on chip implementation on the Digilent Arty S7-50 FPGA development board.☆39Oct 5, 2020Updated 5 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago