Ring Oscillator Physically Unclonable Funtion
☆26Sep 9, 2021Updated 4 years ago
Alternatives and similar repositories for RO_PUF
Users that are interested in RO_PUF are comparing it to the libraries listed below
Sorting:
- FPGA implementation of a physical unclonable function for authentication☆33Apr 7, 2017Updated 8 years ago
- An end-to-end chip authentication architecture based on SRAM PUF and public key cryptography.☆17Nov 22, 2019Updated 6 years ago
- An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks☆16Oct 10, 2020Updated 5 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆139Nov 5, 2022Updated 3 years ago
- Repository to store all design and testbench files for Senior Design☆22Apr 16, 2020Updated 5 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Nov 24, 2017Updated 8 years ago
- A final semester based group project for EE4218: Embedded Hardware System Design module in NUS where I worked with my teammate to perform…☆18May 4, 2023Updated 2 years ago
- Python Code and Dataset for different PUFs☆19May 14, 2021Updated 4 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Oct 25, 2017Updated 8 years ago
- ESP32-NOW with Wifi☆23Apr 11, 2025Updated 10 months ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- Defense/Attack PUF Library (DA PUF Library)☆55May 5, 2020Updated 5 years ago
- Implementation of ECC on FPGA-Zynq7000 SoC☆19Jul 12, 2019Updated 6 years ago
- A graphical user interface for measuring and performing inter-active analysis of physical unclonable functions (PUFs)☆27Jun 24, 2020Updated 5 years ago
- Verilog based BCH encoder/decoder☆132Sep 26, 2022Updated 3 years ago
- Present Crypto Engine in Verilog☆11Feb 27, 2016Updated 10 years ago
- Cryptanalysis of Physically Unclonable Functions☆92Jun 29, 2024Updated last year
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Hardware-backed biometric authentication for Flutter. Create cryptographic signatures using device biometrics with keys stored in Secure …☆15Feb 23, 2026Updated last week
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆16Oct 19, 2025Updated 4 months ago
- Automated UVM testbench generator from Verilog RTL with optional LLM integration for advanced logic creation.☆18Updated this week
- Lock circuitgraphs using various logic locking techniques☆11May 2, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Error Correction Codes - C☆11May 26, 2019Updated 6 years ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- ☆10May 10, 2019Updated 6 years ago
- A true random number generator with ring oscillators structure written in VHDL targeting FPGA's.☆11Sep 22, 2020Updated 5 years ago
- TLS Secured connection example between Mosquitto broker (MQTT) and ESP32☆11Apr 12, 2021Updated 4 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Sep 18, 2020Updated 5 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆12Aug 4, 2025Updated 6 months ago
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 11 months ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago