Correlation Power Analysis
☆13Aug 3, 2018Updated 7 years ago
Alternatives and similar repositories for CPA
Users that are interested in CPA are comparing it to the libraries listed below
Sorting:
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- ☆13Feb 8, 2022Updated 4 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Jul 24, 2017Updated 8 years ago
- ☆11Apr 22, 2020Updated 5 years ago
- Use mason's rule to simplify signal flow graphs in MATLAB☆11Mar 5, 2020Updated 5 years ago
- SmaliAnalyzer parses dissasembled bytecode of Android applications to gather as much information as possible about their component classe…☆13Apr 17, 2019Updated 6 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- Reverse HTTP proxy server that requires Yubikey OTP authentication to allow proxying.☆10Jul 24, 2017Updated 8 years ago
- Virtual CAC using libcacard, virtualsmartcard's vpcd and softhsm2 to provide PCSC accessible virtual smart card.☆12Feb 19, 2022Updated 4 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 3 years ago
- A true random number generator with ring oscillators structure written in VHDL targeting FPGA's.☆11Sep 22, 2020Updated 5 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Experiment with Laser Cube☆10Jul 3, 2021Updated 4 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- Save Inkscape drawings as G-Code files suitable for plotting using GRBL ESP32☆11May 7, 2020Updated 5 years ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- 中央认证服务 / Central Authentication Service☆12Mar 17, 2024Updated last year
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Simulator/interpreter for Arm64 machine language☆14Jun 17, 2022Updated 3 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- ☆11Jun 27, 2022Updated 3 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 3 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Nov 26, 2024Updated last year
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- a script to help with running qemu☆12May 19, 2024Updated last year
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- this is a repository for MIPS tools.You can find some statically linked tools like GDB\TCPDUMP\GDBSERVER, which can used for IOT security…☆10Nov 20, 2020Updated 5 years ago
- ☆12Apr 20, 2022Updated 3 years ago
- 白盒CLEFIA加密算法☆14Mar 30, 2016Updated 9 years ago
- 爬取微博数据形成用户画像 登陆账号获取cookies 使用selenium,先调用chrome浏览器 最后改成PhantomJS,并根据其中的内容获取想要的数据☆11Mar 7, 2019Updated 6 years ago
- Web-based assembler & debugger for a subset of ARM☆10Nov 20, 2018Updated 7 years ago
- Java Card applet with REFRESH command support for SIM Toolkit application☆17Aug 2, 2020Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago