IAIK / ascon_hardware
Hardware implementations of the authenticated encryption design ASCON
☆19Updated 7 years ago
Alternatives and similar repositories for ascon_hardware:
Users that are interested in ascon_hardware are comparing it to the libraries listed below
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆24Updated last year
- Masked Ascon Software Implementations☆11Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆31Updated 4 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆34Updated 5 months ago
- A collection of Ascon implementations & documents (as submodules)☆42Updated this week
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆10Updated last year
- A free and open source tool for Deep Learning Side Channel Analysis☆16Updated 5 years ago
- ☆46Updated 8 months ago
- ☆10Updated last year
- ☆17Updated 3 months ago
- ☆10Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆15Updated last year
- ☆15Updated 2 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆34Updated 3 years ago
- Side-Channel Analysis Library☆77Updated last week
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆34Updated 3 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆48Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆26Updated 6 years ago
- ☆16Updated 3 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- Verilog Hardware Design of Ascon v1.2☆20Updated last month
- High-order countermeasures for AES and DES☆25Updated 5 months ago
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- ☆21Updated 4 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- High-assurance, high-performance C90 implementation of ML-KEM☆27Updated this week