@IAIK

Institute of Applied Information Processing and Communications (IAIK)

  • This repository contains several applications, demonstrating the Meltdown bug.

    C 2,889 264 Zlib 1 issue needs help Updated Jan 15, 2018
  • SWEB Educational OS

    C++ 33 46 Updated Jan 12, 2018
  • Optimized implementation of the Picnic signature scheme

    C 8 6 MIT Updated Jan 12, 2018
  • JavaScript 1 2 EUPL-1.1 Updated Jan 4, 2018
  • Eliminating Keystroke Timing Attacks

    C 11 6 Zlib Updated Dec 13, 2017
  • Google Chrome extension implementing JavaScript Zero

    JavaScript 51 4 MIT 1 issue needs help Updated Dec 12, 2017
  • Short DAPS from ECDSA in OpenSSL

    C 2 Updated Dec 6, 2017
  • FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C

    Scilab 12 2 GPL-3.0 Updated Nov 17, 2017
  • Tools for "Another Flip in the Wall"

    C 15 5 Updated Nov 2, 2017
  • Kernel Address Isolation to have Side-channels Efficiently Removed

    173 18 BSD-3-Clause Updated Nov 1, 2017
  • This repository contains tools to perform modern cache attacks on ARM.

    C 186 43 Updated Oct 7, 2017
  • Framework for building transparent memory encryption and authentication solutions

    VHDL 8 1 GPL-3.0 Updated Aug 28, 2017
  • This repository contains examples of DRAMA reverse-engineering and side-channel attacks

    C++ 89 25 Unlicense Updated Aug 24, 2017
  • Hardware implementations of the authenticated encryption design ASCON

    VHDL 3 Apache-2.0 Updated Aug 21, 2017
  • Implementation of the Fish and Begol signature schemes

    C 4 MIT Updated Jul 3, 2017
  • Practical Keystroke Timing Attacks in Sandboxed JavaScript

    HTML 17 1 Updated Jun 22, 2017
  • This repository contains examples of Flush+Flush cache attacks

    C 64 18 Unlicense Updated Jun 21, 2017
  • C library for bilinear pairings

    C 6 2 Updated Jun 12, 2017
  • Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript

    C++ 352 60 Apache-2.0 Updated May 12, 2017
  • This repository contains several tools to perform Cache Template Attacks

    C 49 25 Unlicense Updated May 11, 2017
  • CJAG is an open-source implementation of our cache-based jamming agreement.

    C 255 25 Updated Apr 23, 2017
  • This repository contains several tools to perform Prefetch Side-Channel Attacks

    C 16 5 Unlicense Updated Feb 22, 2017
  • Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.

    C 1 3 Updated Sep 23, 2015
  • A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).

    C 39 15 Updated Sep 7, 2015
  • The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.

    C 9 3 Updated Sep 4, 2015
  • Java 4 Updated Mar 8, 2014
  • Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.

    Java 1 Updated Apr 30, 2013