ermin-sakic / second-order-dpa

An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
18Updated 11 years ago

Alternatives and similar repositories for second-order-dpa:

Users that are interested in second-order-dpa are comparing it to the libraries listed below