An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
☆19Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for second-order-dpa
Users that are interested in second-order-dpa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆26Aug 6, 2013Updated 12 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- A generic SmartCard firmware implementation allowing for communication based on ISO 7816 Part 3/Part 4 protocol standards, incorporating …☆22Aug 6, 2013Updated 12 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆54Feb 15, 2020Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- A definitive guide to build Tensorflow with Intel MKL support on Mac☆16Mar 28, 2018Updated 8 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- (Neo)Vim plugin to navigate todos in Go projects with ease☆15Jan 22, 2019Updated 7 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- bash scripts for the ELO of RU☆11Nov 30, 2022Updated 3 years ago
- A multiplexer for TikZ Circuits☆14Jul 29, 2015Updated 10 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- A quick version of the keeloq crypto system written in python.☆11Apr 24, 2015Updated 10 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Online audio file mastering analyzer☆12Aug 30, 2023Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- ☆12Apr 10, 2018Updated 8 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- OneWire lets you access 1-wire devices made by Maxim/Dallas, such as temperature sensors and ibutton secure memory. Library for arduino☆16Mar 17, 2013Updated 13 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆15May 13, 2017Updated 8 years ago
- Save Inkscape drawings as G-Code files suitable for plotting using GRBL ESP32☆12May 7, 2020Updated 5 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 10 months ago
- Custom CUDA kernel doing a normalized cross correlation on a batch of signals via pycu_interface.☆10Apr 11, 2018Updated 8 years ago
- Experiment with Laser Cube☆10Jul 3, 2021Updated 4 years ago
- ☆15Jan 22, 2018Updated 8 years ago