A tutorial on side channel leakage modelling using linear regression
☆15Nov 20, 2017Updated 8 years ago
Alternatives and similar repositories for leakage-modelling-tutorial
Users that are interested in leakage-modelling-tutorial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆53Feb 15, 2020Updated 6 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆26Aug 6, 2013Updated 12 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Linux CLI tool to forward TCP connections from one network namespace to another network namespace☆15Feb 15, 2026Updated last month
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- FPGA based dumper for flashes and more☆17Apr 4, 2025Updated 11 months ago
- Ghidra plugin for querying the Symgrate databases.☆15Apr 30, 2025Updated 10 months ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- (Neo)Vim plugin to navigate todos in Go projects with ease☆15Jan 22, 2019Updated 7 years ago
- Highlighting of searches via star, auto-highlighting.☆16Mar 14, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 9 years ago
- ☆17Updated this week
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆12Mar 5, 2018Updated 8 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- A simple, generic text rendering system in Zig, based on FreeType and HarfBuzz.☆13Sep 14, 2024Updated last year
- 常用蓝牙漏洞CVE poc、EXP☆38Aug 22, 2018Updated 7 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- CPU Adventure task from Dragon CTF 2019 teaser☆31May 22, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Python library for parsing the serialized format used on keyboard-layout-editor.com (KLE).☆12Jan 17, 2025Updated last year
- A Hardware MD5 Cracker for the Cyclone V SoC☆12Mar 25, 2015Updated 11 years ago
- 一个可以扩展的github源码监控系统☆18Aug 28, 2019Updated 6 years ago
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Nov 14, 2021Updated 4 years ago
- Hatch plugin to build zip archives which unpack to a single specifically-named directory☆16Jun 7, 2025Updated 9 months ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- KiCAD plugin written in Python for programatically placing clusters of components onto a PCB from a layout file.☆10Jun 30, 2021Updated 4 years ago
- Investigation of Starlink User Terminal☆35Dec 8, 2020Updated 5 years ago
- A library to parse Android application's manifest and signature☆22Feb 21, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Helper scripts for ergogen (an ergonomic keyboard generator)☆13May 7, 2023Updated 2 years ago
- Yet Another Classical planning plan validator written in modern Common Lisp☆13Nov 9, 2021Updated 4 years ago
- SQL Injection vulnerabilites can cause a lot of damage to a web application. A malicious user can possibly view records, delete records, …☆31Oct 8, 2013Updated 12 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 8 years ago
- Yet Another Portable Library for Process Handling / Subshell Invokation☆10Aug 1, 2020Updated 5 years ago
- Designed a digital communication system using QAM modulation on Octave with Symbol Timing and Carrier Frequency Recovery☆20Aug 22, 2017Updated 8 years ago
- libsodium for Ada - A secure cryptographic library☆11Jul 18, 2016Updated 9 years ago