ermin-sakic / second-order-dpaView external linksLinks
An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆19Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for second-order-dpa
Users that are interested in second-order-dpa are comparing it to the libraries listed below
Sorting:
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 3 months ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- ☆23Feb 13, 2020Updated 6 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Material extra☆14Dec 6, 2017Updated 8 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Igor Pro data analysis procedures☆15Sep 26, 2020Updated 5 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- AMX NetLinx IP Socket Manager☆13May 2, 2017Updated 8 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Source code, CNN model and examples for the proceedings paper: CNN based powder bed monitoring and anomaly detection for the selective la…☆10Dec 1, 2021Updated 4 years ago
- maxscript fun☆10Nov 22, 2019Updated 6 years ago
- ODIN console files, for remote control of PowerSDR☆13Aug 11, 2021Updated 4 years ago
- A verified permissioned centralized Blockchain for Isabelle/HOL☆11Feb 3, 2018Updated 8 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- Three hundred years ago, the Brazilian Space Agency discovered a rocky exoplanet only 38 light years from Earth. With a surface temperatu…☆10Feb 19, 2016Updated 9 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- A class for working with CouchDB documents from Cappuccino/Objective-J☆65Oct 12, 2009Updated 16 years ago
- A Mercury CSV library.☆13Jan 20, 2026Updated 3 weeks ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Opa port of the TodoMVC app☆24Mar 11, 2012Updated 13 years ago
- Automated Measurement and Analysis of Open-Source Software☆14Oct 6, 2017Updated 8 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- Cap’n Proto plugin for generating serializable Pony classes. - 'n☆19Apr 7, 2018Updated 7 years ago
- bash scripts for the ELO of RU☆11Nov 30, 2022Updated 3 years ago