Tribler / software-based-PUF
The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM
☆93Updated last month
Alternatives and similar repositories for software-based-PUF:
Users that are interested in software-based-PUF are comparing it to the libraries listed below
- FPGA implementation of a physical unclonable function for authentication☆32Updated 7 years ago
- Defense/Attack PUF Library (DA PUF Library)☆48Updated 4 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆21Updated 7 years ago
- Cryptanalysis of Physically Unclonable Functions☆84Updated 9 months ago
- Side-channel analysis setup for OpenTitan☆30Updated 2 weeks ago
- Repository to store all design and testbench files for Senior Design☆18Updated 4 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆14Updated 7 years ago
- Side-Channel Analysis Library☆82Updated last week
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆130Updated 2 years ago
- ☆48Updated 4 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆20Updated last week
- A graphical user interface for measuring and performing inter-active analysis of physical unclonable functions (PUFs)☆24Updated 4 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆10Updated 5 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆12Updated 4 months ago
- A list of VHDL codes implementing cryptographic algorithms☆25Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Cryptographic Key Generation from PUF Data☆20Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆25Updated last year
- This is a project in which side-channel attacks are researched and developed.☆45Updated 4 years ago
- ☆21Updated 5 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆35Updated 4 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated 6 months ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆31Updated 3 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆50Updated 2 years ago
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆83Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆38Updated last week
- ☆48Updated 10 months ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆38Updated last week
- ☆21Updated 9 months ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago