ikizhvatov / leakage-modelling-tutorialView external linksLinks
A tutorial on side channel leakage modelling using linear regression
☆14Nov 20, 2017Updated 8 years ago
Alternatives and similar repositories for leakage-modelling-tutorial
Users that are interested in leakage-modelling-tutorial are comparing it to the libraries listed below
Sorting:
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Efficient ways to compute Pearson's correlation between columns of two matrices in various scientific computing languages☆29Mar 14, 2018Updated 7 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- ☆10Sep 10, 2025Updated 5 months ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 2 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- Linux CLI tool to forward TCP connections from one network namespace to another network namespace☆14Nov 3, 2023Updated 2 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated 3 weeks ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- gcnano-binaries☆11Nov 27, 2025Updated 2 months ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- ExtJS component for drawing trees (actually Directed Acyclic Graphs)☆21Aug 16, 2012Updated 13 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- A Python library for parsing the serialized format used on keyboard-layout-editor.com (KLE).☆12Jan 17, 2025Updated last year
- Microemacs (aka uemacs) v2.0 text editor by Dave Conroy from 1985. Updated to compile on Windows and Linux.☆16Sep 15, 2022Updated 3 years ago
- A WIP Udemy downloader written in Go☆11Mar 20, 2022Updated 3 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Nov 14, 2021Updated 4 years ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆14Sep 16, 2020Updated 5 years ago
- A tool to extract plain text from HTML pages☆10Dec 7, 2017Updated 8 years ago