Git Product home page Git Product logo

acad2's Projects

paralleljava icon paralleljava

Example programs written using the Parallel Java library

phdthesis icon phdthesis

Source code for some of the stuff I made during my PhD

present.jl icon present.jl

This package implements the PRESENT encryption algorithm as proposed in the paper PRESENT: An Ultra-Lightweight Block Cipher

pride icon pride

Python Runtime and Integrated Development Environment

publications icon publications

A repository for the LaTeX code written for several publications. The finals of these publications are posted on the Scribd (http://www.scribd.com/WillemVanOnsem) and 4shared page (http://www.4shared.com/u/rPjCz-aM/Van_Onsem_Willem.html).

pyaes icon pyaes

Pure-Python implementation of AES block-cipher and common modes of operation.

pylatex icon pylatex

A Python library for creating LaTeX files

pyminisolvers icon pyminisolvers

A Python API for the MiniSat and MiniCard constraint solvers.

pypdf2 icon pypdf2

A utility to read and write PDFs with Python

pypuf icon pypuf

Simulation and Learning of Physically Unclonable Functions

pysca icon pysca

Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations

sbox icon sbox

Analysis and generation of substitutions

sboxdiscovery icon sboxdiscovery

Brute-force search algorithm for Bitslice DES S-box functions with Nvidia Maxwell LOP3.LUT instructions written in C#

sboxgates icon sboxgates

Program for finding low gate count implementations of S-boxes.

sboxoptimization icon sboxoptimization

Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers

sca icon sca

This repositiry consists of my work in the field of Side Channel Analysis, The tools developed for analysis are in julia

sca-dpa icon sca-dpa

Side channel attack (SCA) of AES with Differential Power Analysis (DPA)

sca_notebooks icon sca_notebooks

this contains the testing and code snippets done in notebooks related to SCA

scam icon scam

Side-Channel Attack Monitoring and Mitigation

school icon school

Stuff, I coded during my studies

second-order-dpa icon second-order-dpa

An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontrollers leaking Hamming Weight power models.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.