saadislamm
Fulbright PhD scholar working in hardware security and post-quantum cryptography at Vernam Lab, Worcester Polytechnic Institute.
Worcester Polytechnic Institute (WPI)Massachusetts
Pinned Repositories
ASLR
This simple tutorial shows the effect of Address Space Layout Randomization (ASLR)
CubeAttack
Cube Attack on LBLOCK, Trivium and A5/1 ciphers
dlp_bruteforce
Too see how inefficient brute-force is as compared to Pollard's Rho and Index Calculus for solving Discrete Log Problem (DLP)
Electronic-codebook-ECB
This code depicts that ECB mode of encryption reveals information
Grain128a-authentication
N-puzzle
"A" Algorithm to solve the N Sliding Puzzle using Manhattan Distance
page_allocation
New page maps at the last freed physical address
QuantumHammer
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
SHA-256-Hash
SPOILER
Speculative Load Hazards Boost Rowhammer and Cache Attacks - CVE-2019-0162 -
saadislamm's Repositories
saadislamm/SPOILER
Speculative Load Hazards Boost Rowhammer and Cache Attacks - CVE-2019-0162 -
saadislamm/CubeAttack
Cube Attack on LBLOCK, Trivium and A5/1 ciphers
saadislamm/Grain128a-authentication
saadislamm/N-puzzle
"A" Algorithm to solve the N Sliding Puzzle using Manhattan Distance
saadislamm/page_allocation
New page maps at the last freed physical address
saadislamm/SHA-256-Hash
saadislamm/ASLR
This simple tutorial shows the effect of Address Space Layout Randomization (ASLR)
saadislamm/dlp_bruteforce
Too see how inefficient brute-force is as compared to Pollard's Rho and Index Calculus for solving Discrete Log Problem (DLP)
saadislamm/Electronic-codebook-ECB
This code depicts that ECB mode of encryption reveals information
saadislamm/QuantumHammer
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
saadislamm/syscall_benchmark
This code measures the CPU cycles for various system calls.
saadislamm/virtual_to_physical
A simple program to convert virtual addresses to physical addresses using the pagemap
saadislamm/xorcorrector-vonneumann
Post-Processing Techniques for Biased Random Number Generators