Chair-for-Security-Engineering / VERICA
☆14Updated 2 months ago
Alternatives and similar repositories for VERICA:
Users that are interested in VERICA are comparing it to the libraries listed below
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated 5 months ago
- Side-Channel Analysis Library☆78Updated this week
- ☆21Updated 5 years ago
- ☆47Updated 9 months ago
- SILVER - Statistical Independence and Leakage Verification☆13Updated 2 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆46Updated 6 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆50Updated 2 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆25Updated last year
- Masked Hardware AES with HPC☆12Updated 4 months ago
- Side-channel analysis setup for OpenTitan☆29Updated 2 weeks ago
- ☆16Updated 4 years ago
- prime+probe code targeting a given physical address on libgcrypt run in an SGX enclave☆15Updated 6 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆15Updated last year
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆28Updated 3 years ago
- David Canright's tiny AES S-boxes☆22Updated 10 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- This is a GIT syncronization of https://wiki.newae.com☆10Updated 7 years ago
- Verilog Hardware Design of Ascon☆20Updated last week
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆36Updated this week
- ☆20Updated last year
- Hardware implementation of Saber☆8Updated 4 years ago
- ☆20Updated 8 months ago
- Cryptanalysis of Physically Unclonable Functions☆83Updated 8 months ago
- Research code to perform AES timing attacks circa 2006☆15Updated 11 years ago
- processor for post-quantum cryptography☆14Updated 4 years ago
- ☆98Updated 2 years ago
- This is a project in which side-channel attacks are researched and developed.☆43Updated 4 years ago