MATLAB scripts for efficient template attacks
☆15Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for grizzly
Users that are interested in grizzly are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- ☆14Dec 7, 2015Updated 10 years ago
- A definitive guide to build Tensorflow with Intel MKL support on Mac☆16Mar 28, 2018Updated 8 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- ☆37Jun 6, 2017Updated 8 years ago
- A High-Performance Side-Channel-Resistant AES on GPUs☆13May 9, 2019Updated 6 years ago
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 7 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Repository code to support paper TCHES2020 paper "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders"☆13Jun 4, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Source code for the paper "Towards Semantic-Aware Multiple-Aspect Trajectory Similarity Measuring"☆16Jul 29, 2020Updated 5 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Fast Bayesian Hidden Markov Model with Wavelet Compression☆17Jan 24, 2020Updated 6 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 3 years ago
- PS3 NAND/NOR/eMMC Flash Dumper☆11Sep 24, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Side Channels Analysis and Deep Learning☆233Dec 31, 2025Updated 2 months ago
- Calculate z-scores of anthropometric measurements based on WHO and CDC child growth standards☆28Sep 5, 2023Updated 2 years ago
- ElectroMagnetic Mining Array. A tool for the distributed analysis of electromagnetic radiation in context of cryptographic side-channel a…☆47Nov 21, 2022Updated 3 years ago
- Java Machine Learning Library☆28Jun 17, 2025Updated 9 months ago
- EstraNet: An Efficient Shift-Invariant Transformer Network for Side Channel Analysis☆11Aug 26, 2025Updated 7 months ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- A Batch Script to uninstall multiple Android Apps at once☆16Nov 4, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 2 years ago
- ☆198Jun 12, 2024Updated last year
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆26Aug 6, 2013Updated 12 years ago
- prime+probe code targeting a given physical address on libgcrypt run in an SGX enclave☆15Dec 6, 2018Updated 7 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- ☆23Jan 21, 2019Updated 7 years ago