isec-tugraz / memsecLinks
Framework for building transparent memory encryption and authentication solutions
☆27Updated 7 years ago
Alternatives and similar repositories for memsec
Users that are interested in memsec are comparing it to the libraries listed below
Sorting:
- QARMA block cipher in C☆30Updated 2 years ago
- ☆17Updated 2 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆12Updated 3 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- ☆20Updated 3 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆38Updated last week
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- ☆20Updated 5 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 3 weeks ago
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- A repository of tools for verifying constant-timeness☆18Updated 4 months ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- High-order countermeasures for AES and DES☆25Updated 10 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ☆36Updated 4 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆55Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago