ANSSI-FR / IPECCLinks
A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration
☆44Updated last month
Alternatives and similar repositories for IPECC
Users that are interested in IPECC are comparing it to the libraries listed below
Sorting:
- Hardware Design of Ascon☆28Updated last week
- Side-channel analysis setup for OpenTitan☆37Updated 3 weeks ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆30Updated 2 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- Side-Channel Analysis Library☆99Updated last month
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- XCrypto: a cryptographic ISE for RISC-V☆92Updated 2 years ago
- Designs of first-order SCA-secure hardware implementations of AES encryption/decryptoin dedicated to Xilinx FPGAs (using BRAM)☆16Updated 4 years ago
- Modular Exponentiation core written i Verilog. Supports key lengths between 32 and 8192 bits.☆17Updated 5 years ago
- Verilog implementation of 1024 bit Hybrid Montgomery Multiplication/Exponentiation☆10Updated 5 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Updated 3 years ago
- True Random Number Generator core implemented in Verilog.☆76Updated 5 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Updated 6 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Verilog HDL implementation of Elliptic Curve Cryptography (ECC) over GF(2^163)☆22Updated 7 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆19Updated 5 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- Defense/Attack PUF Library (DA PUF Library)☆51Updated 5 years ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 8 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆23Updated 7 years ago
- Implementation of ECC on FPGA-Zynq7000 SoC☆19Updated 6 years ago
- Elgamal's over Elliptic Curves☆19Updated 6 years ago
- Exploring the Ed25519 (FPGA) design space.☆17Updated 7 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆36Updated last week
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆40Updated last month
- HW Design Collateral for Caliptra RoT IP☆112Updated this week