ermin-sakic / first-order-dpaView external linksLinks
An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆27Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for first-order-dpa
Users that are interested in first-order-dpa are comparing it to the libraries listed below
Sorting:
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 3 months ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 7 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- 🎨 A tool program to set terminal colors from image☆10May 3, 2017Updated 8 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Infinite space to explore with a space ship on a HTML5 Canvas.☆17Dec 1, 2018Updated 7 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Sep 8, 2023Updated 2 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- Allows to execute haskell code in Ida Pro.☆27Dec 22, 2015Updated 10 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 3 years ago