Changes

Main Page

8 bytes added, 20:16, 29 March 2016
Rearranged source code link
ChipWhisperer is maintained by [https://www.newae.com NewAE Technology Inc.], which sells a combination of open-source hardware, supporting tools, training, and consulting services. ChipWhisperer is trademark of NewAE Technology Inc., registered in the US and Europe. This means only NewAE can sell official products under the ChipWhisperer name, and was done to ensure products meet [[Quality Control Guidelines]], as these fairly complex products require good testing to ensure you don't have a frustrating experience.
== Recent/Upcoming Events ==
The following events will be either be attended by someone from NewAE, or have a presentation using the ChipWhisperer.
* Blackhat USA 2016 (Training based on ChipWhisperer)
== Getting Started ==
Where to begin? If you're new to this area, see the [[Getting Started]] page, which details how you can get involved in side-channel power analysis. From there you can see the hardware documentation (linked below), or take one of the [[Training Courses]].
== Hardware Instructions ==
===== Capture Hardware =====
ChipWhisperer-Hardware:
* [[Tutorial A5 Breaking AES-256 Bootloader]]
* [[Tutorial A6 Replication of Ilya Kizhvatov's XMEGA® Attack]]
 
= Source Code and Releases =
 
* Source code is held in the [https://www.assembla.com/spaces/chipwhisperer/git/source Git Repository].
* See [[Releases]] for details of software releases.
= ChipWhisperer Training Material =
[[Embedded Attacks]]
 
= Source Code and Releases =
 
* Source code is held in the [https://www.assembla.com/spaces/chipwhisperer/git/source Git Repository].
* See [[Releases]] for details of software releases.
Approved_users, bureaucrat, administrator
1,956
edits