Commit 9e05925e authored by Momin Charles's avatar Momin Charles

Update README.md

parent c120c424
# **Spook Hardware Implementations**
# **Spook Hardware Implementation**
This repository contains all the files relative to the protected HW implementations of [Spook](https://www.spook.dev/) used for
the Hardware-oriented version of the Capture the Flag. A practical implementation was done on
......@@ -444,8 +444,8 @@ bytes long bytestrings.
Based on these data, it is possible to recover the internal masked states for each computation.
To do so, we rely on the [Verilator tool](https://www.veripool.org/wiki/verilator), as explained
[here](https://git-crypto.elen.ucl.ac.be/obronchain/ctf-analysis/-/blob/attacks/HW/simulations/PROBE.md).
To do so, we rely on the [Verilator tool](https://www.veripool.org/wiki/verilator). This process is more
detailed in the [demo_submission package]{https://ctf.spook.dev/}.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment