Changes

Main Page

110 bytes removed, 18 March
WARNING: This wiki is now deprecated, as of August 2020. Product documentation is moved to https://rtfm.newae.com
== WARNING: This wiki is now deprecated, as of August 2020. Product documentation is moved to https://rtfmchipwhisperer.newaereadthedocs.com io/en/latest/ ==
Welcome to ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks. This is the main landing page for ChipWhisperer. ChipWhisperer has been presented at conferences such as DEFCON and Blackhat, had a [https://www.kickstarter.com/projects/coflynn/chipwhisperer-lite-a-new-era-of-hardware-security successful Kickstarter (that delivered ahead of schedule)], and placed 2nd place in the first annual Hackaday Prize. ChipWhisperer has been used in a number of academic articles, and is featured in the Car Hacking Handbook. Portions of the design have even been used by [http://permalink.lanl.gov/object/tr?what=info:lanl-repo/lareport/LA-UR-15-26344 Los Alamos Labs for an electron accelerator]. You can see a full list of references on the [[Press]] page.
== Sample Projects and Tutorials ==
Tutorials are implemented using Jupyter Notebooks, available in our [https://github.com/newaetech/chipwhisperer-jupyter chipwhisperer-jupyter submodule]. You can also find completed versions of the tutorials on [https://chipwhisperer.readthedocs.io/en/latest/tutorials.html Read the Docs].
{{Template:Tutorials}}
Approved_users, administrator
369
edits