An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆19Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for second-order-dpa
Users that are interested in second-order-dpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆26Aug 6, 2013Updated 12 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆70May 31, 2016Updated 9 years ago
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- ☆10Aug 29, 2018Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆54Feb 15, 2020Updated 6 years ago
- ☆23Feb 13, 2020Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Sep 4, 2014Updated 11 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Algebraic + neural differential cryptanalysis of reduced-round KeeLoq (2026 modernization of a 2015 SAT-only effort). Full 64-bit key rec…☆11Apr 23, 2026Updated 2 weeks ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- opencv python script for face detection and recognition, people detection and more☆14Dec 20, 2016Updated 9 years ago
- ☆11Nov 21, 2015Updated 10 years ago
- Yet another JavaScript slide framework.☆21Aug 3, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Online audio file mastering analyzer☆12Aug 30, 2023Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- julia interface for accessing Qt via PyCall and PySide☆18Aug 15, 2015Updated 10 years ago
- ☆12Apr 10, 2018Updated 8 years ago
- Parsing MHC nomenclature in the wild☆20Apr 18, 2026Updated 2 weeks ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- OneWire lets you access 1-wire devices made by Maxim/Dallas, such as temperature sensors and ibutton secure memory. Library for arduino☆16Mar 17, 2013Updated 13 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆15May 13, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Save Inkscape drawings as G-Code files suitable for plotting using GRBL ESP32☆12May 7, 2020Updated 6 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 4 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- BiSUNA framework specialized to compile for the Xilinx Alveo U50☆13Dec 3, 2020Updated 5 years ago
- MATLAB scripts for efficient template attacks☆15Apr 20, 2018Updated 8 years ago