User contributions
21 June 2016
Tutorial A5 Breaking AES-256 Bootloader
Analysis of Encrypted Files
-39
Tutorial A5 Breaking AES-256 Bootloader
Took out warning
-63
Tutorial A5 Breaking AES-256 Bootloader
14th Round Key: Rewrite
-388
File:Tutorial-A5-Results-Right-Key.PNG
no edit summary
File:Tutorial-A5-Results-Wrong-Key.PNG
no edit summary
File:Tutorial-A5-Hardware-Model.PNG
no edit summary
File:Tutorial-A5-Plot-Traces.PNG
no edit summary
Tutorial A5 Breaking AES-256 Bootloader
Capturing the Traces: Added image
+43
File:Tutorial-A5-Capture.PNG
no edit summary
Tutorial A5 Breaking AES-256 Bootloader
Analyzing of Power Traces for Key: Added intro and changed section names
-73
Tutorial A5 Breaking AES-256 Bootloader
Capturing the Traces: Rewrite
-219
Tutorial A5 Breaking AES-256 Bootloader
Setting up the Hardware: Changed hardware
-1,301
Tutorial A5 Breaking AES-256 Bootloader
Reformatted sections
-29
Tutorial A5 Breaking AES-256 Bootloader
Attacking AES-256: Moved contents to theory page
-3,628
Extending AES-128 Attacks to AES-256
Removed extra sections.
+26
Extending AES-128 Attacks to AES-256
Added theory on attack
+3,561
Extending AES-128 Attacks to AES-256
Added page
Main Page
Theory: Added AES-256 page
+43
20 June 2016
Tutorial A5 Breaking AES-256 Bootloader
Details of AES-256 CBC: Rewrote section
+993
Tutorial A5 Breaking AES-256 Bootloader
Background: Minor correctness issue
-20
Tutorial A5 Breaking AES-256 Bootloader
Bootloader Design: Cleaned up communication protocol
-182
Tutorial A5 Breaking AES-256 Bootloader
Background: Added high-level background info
+1,831
Tutorial A5 Breaking AES-256 Bootloader
Bootloader Design
-37
9 June 2016
Tutorial B7 Profiling Attacks (with HW Assumption)
Capturing the Attack Traces: Don't need to close the program...
+4
Tutorial B7 Profiling Attacks (with HW Assumption)
Capturing the Traces: Application no longer needs to be closed between campaigns
-59
2 June 2016
Quality Control Guidelines
Placeholder to make page
File:Luna.jpg
no edit summary
Main Page
Source Code and Releases: Fixed broken link
+90
Getting Started
Added page
Tutorial A5 Breaking AES-256 Bootloader
Details of AES-256 CBC: Fixed broken link
-6
CW1002 ChipWhisperer Capture Rev2
CWCR2: Using the AVR Programmer: Fixed broken link
+2
Tutorial B1 Building a SimpleSerial Project
Programming the Example: Fixed broken link to Atmel Studio
+5
Main Page
Getting Started: Added link to training courses
+25
1 June 2016
Profiling Attacks with Neural Networks
Added sample output
+1,563
Profiling Attacks with Neural Networks
Made page
Embedded Attacks
Added link to neural network attack
+51
26 May 2016
Tutorial B8 Profiling Attacks (Manual Template Attack)
Added script in appendix and mentioned scipy include
+5,456
Tutorial B8 Profiling Attacks (Manual Template Attack)
Gotchas: Added section
+1,315
Tutorial B8 Profiling Attacks (Manual Template Attack)
Performing the Attack: Added section
+3,157
Tutorial B8 Profiling Attacks (Manual Template Attack)
Sorting the Traces: Fixed np.array() to work with list of arrays
+34
Tutorial B8 Profiling Attacks (Manual Template Attack)
Covariance Matrices: Added section
+1,906
Tutorial B8 Profiling Attacks (Manual Template Attack)
Points of Interest: Added section
+3,054
File:Template-Mean-Trace.png
no edit summary
25 May 2016
Tutorial B8 Profiling Attacks (Manual Template Attack)
Sorting the Traces: Minor addition
+122
Tutorial B8 Profiling Attacks (Manual Template Attack)
Creating the Template: Added section on sorting traces
+3,382
Tutorial B8 Profiling Attacks (Manual Template Attack)
Added section on how to using python scripts
+394
Tutorial B8 Profiling Attacks (Manual Template Attack)
Creating the Template: Started section
+1,574
Tutorial B8 Profiling Attacks (Manual Template Attack)
Short addition to intro
+246
Tutorial B8 Profiling Attacks (Manual Template Attack)
Capturing the Traces: Added section
+684
Tutorial B8 Profiling Attacks (Manual Template Attack)
no edit summary
+24