hellman / wboxkit
White-box Design and Analysis kit
☆22Updated last year
Related projects: ⓘ
- CHES 2022 White-box Cryptography Tutorial☆19Updated last year
- ☆14Updated 4 years ago
- White-box Analysis and Implementation Tools☆70Updated 2 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 4 years ago
- Differential fault analysis framework for AES128☆46Updated 11 years ago
- ☆19Updated 4 years ago
- Implicit White-box Implementations of ARX Ciphers☆13Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆11Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- ☆12Updated 4 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆25Updated last week
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆53Updated 2 weeks ago
- Differential Address Trace Analysis☆51Updated 5 months ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆84Updated 5 years ago
- A tool to perform so called BGE attack☆20Updated 5 months ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆31Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 5 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆12Updated 8 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- Program for finding low gate count implementations of S-boxes.☆36Updated 2 years ago
- Side-channel traces visualizer☆13Updated 6 months ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆172Updated 3 months ago
- ☆53Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated last month
- ☆62Updated 4 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆28Updated 3 years ago
- SMT based attacks on non cryptographic PRNGs☆73Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆12Updated 5 years ago