An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆19Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for second-order-dpa
Users that are interested in second-order-dpa are comparing it to the libraries listed below
Sorting:
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- ☆10Aug 29, 2018Updated 7 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago
- ☆17Sep 4, 2014Updated 11 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- ☆23Feb 13, 2020Updated 6 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- maxscript fun☆10Nov 22, 2019Updated 6 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- AMX NetLinx IP Socket Manager☆13May 2, 2017Updated 8 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Source code, CNN model and examples for the proceedings paper: CNN based powder bed monitoring and anomaly detection for the selective la…☆10Dec 1, 2021Updated 4 years ago
- ☆10May 4, 2019Updated 6 years ago
- ODIN console files, for remote control of PowerSDR☆13Aug 11, 2021Updated 4 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- PilOS - A Stand-Alone Operating System☆14Aug 1, 2017Updated 8 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ooc operating system☆41May 24, 2021Updated 4 years ago
- A simple select/event/time based Lemonbar manager.☆11Apr 3, 2021Updated 4 years ago
- Example of an easy way to take cs notes☆11Mar 11, 2021Updated 4 years ago
- A Hybrid Ensemble Learning Approach to Star-galaxy Classification☆10Sep 3, 2015Updated 10 years ago
- Central place for all PDP-10 microcode☆13Mar 28, 2018Updated 7 years ago
- Miscellaneous Inform 7 extensions that I've written☆11Mar 20, 2021Updated 4 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- Ronin web framework☆30May 8, 2021Updated 4 years ago
- Experiment with Laser Cube☆10Jul 3, 2021Updated 4 years ago
- An open source CalDAV implementation for .NET and Mono, built on Data Abstract.☆12Oct 22, 2012Updated 13 years ago
- (ARCHIVE) nqp-rx☆37Sep 25, 2014Updated 11 years ago