AsmOptC-RiscV / Assembly-Optimized-C-RiscV
☆15Updated 3 years ago
Alternatives and similar repositories for Assembly-Optimized-C-RiscV:
Users that are interested in Assembly-Optimized-C-RiscV are comparing it to the libraries listed below
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆22Updated last year
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆34Updated 3 years ago
- masked, bit-sliced AES-128 demo code☆13Updated last week
- ☆12Updated 3 years ago
- Program for finding low gate count implementations of S-boxes.☆37Updated 2 months ago
- ☆15Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- A low-level intermediate representation for hardware description languages☆28Updated 4 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆12Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- Program synthesis tools and utilities for LLVM.☆20Updated last year
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆26Updated 5 months ago
- C++ STL for speed and cryptanalytic application☆10Updated this week
- ☆13Updated 3 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆26Updated last month
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆34Updated 5 months ago
- Prince cipher source code in C99 and test vectors with intermediate values☆13Updated 3 years ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testing☆84Updated 6 years ago
- Repository to store all design and testbench files for Senior Design☆17Updated 4 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated 3 months ago
- Modular Exponentiation core written i Verilog. Supports key lengths between 32 and 8192 bits.☆17Updated 4 years ago
- An Implementation of the Number Theoretic Transform☆40Updated last year
- QARMA block cipher in C☆25Updated 2 years ago
- ☆17Updated 3 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago