CHES 2022 White-box Cryptography Tutorial
☆20Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for ches2022wbc
Users that are interested in ches2022wbc are comparing it to the libraries listed below
Sorting:
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- White-box cryptography based on FAPKC algorithm☆29Dec 31, 2025Updated 2 months ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- ☆19Jul 17, 2025Updated 8 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last week
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆22Mar 24, 2021Updated 4 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆675Apr 10, 2024Updated last year
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- ☆12Sep 23, 2021Updated 4 years ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Nov 25, 2024Updated last year
- Automated Generation of Masked Hardware☆19May 7, 2024Updated last year
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆42Feb 11, 2026Updated last month
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆45Sep 20, 2023Updated 2 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Discurso colaborativo para la graduación de la promoción 11-16 del DGIIM☆11May 28, 2016Updated 9 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- ☆20Aug 3, 2018Updated 7 years ago
- Run test on demand with support for many test runners☆10Aug 13, 2024Updated last year
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Transfer learning on Inception-v3 using the BreakHis dataset.☆11Dec 5, 2018Updated 7 years ago
- ☆55May 13, 2024Updated last year
- ☆42May 29, 2024Updated last year
- Hardware Design of Ascon☆39Jan 20, 2026Updated 2 months ago