Second Order Dpa

An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
Alternatives To Second Order Dpa
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Advmlthreatmatrix904
2 years ago2
Adversarial Threat Landscape for AI Systems
Nlp_adversarial_examples112
5 years agomitJupyter Notebook
Implementation code for the paper "Generating Natural Language Adversarial Examples"
Dota2dqn47
7 years ago1Java
This is a deep Q-network (reinforcement learning) AI for Dota 2
Second Order Dpa14
11 years ago1M
An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.
Cowrie Attack13
6 years agoShell
Mapping the ATT&CK matrix in a Cowrie honeypot
Network_based_mitre_attack_matrix9
4 years ago2Ruby
Alternatives To Second Order Dpa
Select To Compare


Alternative Project Comparisons
Popular Attack Projects
Popular Matrix Projects
Popular Security Categories

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Matrix
Attack
Aes