☆54May 13, 2024Updated last year
Alternatives and similar repositories for ELMO
Users that are interested in ELMO are comparing it to the libraries listed below
Sorting:
- ☆17Nov 14, 2022Updated 3 years ago
- DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.☆17Nov 9, 2023Updated 2 years ago
- OpenTitan FI formal verification framework☆16Aug 29, 2023Updated 2 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Side Channels Analysis and Deep Learning☆229Dec 31, 2025Updated 2 months ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- ☆13Nov 2, 2023Updated 2 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 3 weeks ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- go library for ChipWhisperer hardware security platform☆20Aug 1, 2019Updated 6 years ago
- Side-channel analysis setup for OpenTitan☆37Nov 3, 2025Updated 4 months ago
- ChipSHOVER is an XYZ table & driver, with open-source firmware for the controller.☆39Aug 27, 2025Updated 6 months ago
- ☆17May 26, 2020Updated 5 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆39Apr 22, 2022Updated 3 years ago
- ☆23Feb 13, 2020Updated 6 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- ☆44Jun 27, 2022Updated 3 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆192Updated this week
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Jan 3, 2026Updated 2 months ago
- ☆10Apr 13, 2020Updated 5 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- Resources for Fault Injection☆61Mar 4, 2024Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Aug 28, 2025Updated 6 months ago
- Attempts to glitch the code from a 68HC705C8☆14Jul 19, 2022Updated 3 years ago
- ☆20Nov 27, 2023Updated 2 years ago
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆107Feb 25, 2026Updated last week
- Donjon hardware tool for circuits security evaluation☆101Dec 4, 2025Updated 3 months ago
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year