Tribler / software-based-PUF
The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM
☆89Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for software-based-PUF
- FPGA implementation of a physical unclonable function for authentication☆31Updated 7 years ago
- Defense/Attack PUF Library (DA PUF Library)☆45Updated 4 years ago
- Cryptanalysis of Physically Unclonable Functions☆78Updated 4 months ago
- Side-Channel Analysis Library☆74Updated 2 months ago
- ARM Cortex-M implementation of NewHope Ring-LWE based Key-exchange☆9Updated 8 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆24Updated last year
- ☆15Updated 4 months ago
- Cryptographic Key Generation from PUF Data☆20Updated 5 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆125Updated 2 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆21Updated 6 years ago
- Hardware implementation of Saber☆7Updated 4 years ago
- ☆45Updated 3 years ago
- ☆52Updated 4 months ago
- ☆45Updated 5 months ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆41Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆34Updated 3 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆27Updated 3 months ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆12Updated 5 years ago
- Side-channel analysis setup for OpenTitan☆28Updated last month
- A graphical user interface for measuring and performing inter-active analysis of physical unclonable functions (PUFs)☆24Updated 4 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated last month
- Post-quantum crypto library for the ARM Cortex-M4☆295Updated this week
- A list of VHDL codes implementing cryptographic algorithms☆25Updated 2 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆32Updated this week
- This is a project in which side-channel attacks are researched and developed.☆38Updated 4 years ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- ☆21Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆44Updated 6 years ago