isec-tugraz / drawio2tikz
drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz code
☆26Updated last year
Alternatives and similar repositories for drawio2tikz:
Users that are interested in drawio2tikz are comparing it to the libraries listed below
- Side-Channel Analysis Library☆78Updated this week
- A tutorial on side channel leakage modelling using linear regression☆13Updated 7 years ago
- SMT based attacks on non cryptographic PRNGs☆78Updated last year
- ☆66Updated 4 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆49Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆60Updated 7 years ago
- SILVER - Statistical Independence and Leakage Verification☆13Updated 2 years ago
- A script to check for common mistakes in LaTeX source files of scientific papers.☆24Updated last year
- A flush-reload side channel attack implementation☆44Updated 2 years ago
- CVP "trick" for CTF challenges☆130Updated last year
- The open-source component of Prime+Scope, published at CCS 2021☆30Updated last year
- Challenge source code and deployment scripts for UIUCTF 2021☆15Updated 3 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆15Updated last year
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Updated 11 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆47Updated 6 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- Differential Address Trace Analysis☆55Updated 11 months ago
- ☆47Updated 9 months ago
- Website and PoC collection for transient execution attacks☆177Updated 11 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆70Updated 9 months ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆60Updated 7 months ago
- Calculate the AES-128 key schedule given any round key☆30Updated last year
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Side-channel toolkit in Julia☆160Updated 3 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆36Updated this week
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Updated last year
- Differential fault analysis framework for AES128☆48Updated 11 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆61Updated 8 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago
- Coppersmith's method for multivariate polynomials☆159Updated last year