Tribler / software-based-PUFLinks
The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM
☆101Updated last week
Alternatives and similar repositories for software-based-PUF
Users that are interested in software-based-PUF are comparing it to the libraries listed below
Sorting:
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- Defense/Attack PUF Library (DA PUF Library)☆52Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆23Updated 7 years ago
- Side-channel analysis setup for OpenTitan☆37Updated last month
- This is a project in which side-channel attacks are researched and developed.☆47Updated 5 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆134Updated 2 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 3 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆14Updated last year
- Side-Channel Analysis Library☆102Updated 2 months ago
- Repository to store all design and testbench files for Senior Design☆20Updated 5 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- XCrypto: a cryptographic ISE for RISC-V☆92Updated 2 years ago
- ☆52Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆30Updated 2 years ago
- VHDL Implementation of AES Algorithm☆88Updated 4 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆19Updated 5 years ago
- The MIT Sanctum processor top-level project☆30Updated 5 years ago
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆86Updated last year
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆41Updated 2 weeks ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 8 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆37Updated 3 weeks ago
- ☆23Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆23Updated last year
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆24Updated 8 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆45Updated last week
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- Hardware Design of Ascon☆29Updated 3 weeks ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Updated 11 months ago