ermin-sakic / second-order-dpa

An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
18Updated 11 years ago

Related projects

Alternatives and complementary repositories for second-order-dpa