ikizhvatov / pyscaView external linksLinks
Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations
☆50Sep 15, 2018Updated 7 years ago
Alternatives and similar repositories for pysca
Users that are interested in pysca are comparing it to the libraries listed below
Sorting:
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Side Channels Analysis and Deep Learning☆228Dec 31, 2025Updated last month
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Masked Ascon Software Implementations☆12May 3, 2022Updated 3 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 8 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated last month
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Feb 6, 2018Updated 8 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- CATANA - CUT your Wordlist!☆15Oct 2, 2022Updated 3 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆106Jan 29, 2026Updated 2 weeks ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆403Sep 5, 2023Updated 2 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- Hardware implementation of Saber☆10Jul 14, 2020Updated 5 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆95Oct 19, 2023Updated 2 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆21Nov 9, 2021Updated 4 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆69Sep 18, 2022Updated 3 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- ElectroMagnetic Mining Array. A tool for the distributed analysis of electromagnetic radiation in context of cryptographic side-channel a…☆46Nov 21, 2022Updated 3 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Updated this week
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆90Jan 17, 2019Updated 7 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,404Updated this week
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Jan 17, 2022Updated 4 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last week