luminousmen / ZUCLinks
Stream cipher ZUC - core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3.
☆25Updated 2 years ago
Alternatives and similar repositories for ZUC
Users that are interested in ZUC are comparing it to the libraries listed below
Sorting:
- Attacks on Jarvis and Friday☆10Updated 6 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Updated 9 months ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- White-box Analysis and Implementation Tools☆77Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Differential Address Trace Analysis☆62Updated last year
- SCALE: Side-Channel Attack Lab. Exercises☆44Updated 2 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 12 years ago
- 本项目是在 Windows 系统编译运行 X86 平台 VxWorks 6.6 系统,使用的模拟软件是 qemu for Windows☆40Updated 6 years ago
- ☆20Updated 6 years ago
- ☆42Updated 8 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆14Updated 5 years ago
- Meltdown/Spectre PoC src collection.☆510Updated 7 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Updated 6 years ago
- ISC2017安全大会☆15Updated 8 years ago
- Implementation for ZUC stream cipher☆16Updated 9 years ago
- TracerX Symbolic Virtual Machine☆32Updated 2 months ago
- ☆15Updated 5 years ago
- masked, bit-sliced AES-128 demo code☆14Updated 11 months ago
- Program for finding low gate count implementations of S-boxes.☆40Updated last year
- 面向软件安全的污点数据检测系统☆24Updated 9 years ago
- ☆12Updated 6 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago