Tribler / software-based-PUFLinks
The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM
☆103Updated 3 months ago
Alternatives and similar repositories for software-based-PUF
Users that are interested in software-based-PUF are comparing it to the libraries listed below
Sorting:
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆138Updated 3 years ago
- Defense/Attack PUF Library (DA PUF Library)☆55Updated 5 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Updated 8 years ago
- XCrypto: a cryptographic ISE for RISC-V☆92Updated 3 years ago
- Side-channel analysis setup for OpenTitan☆37Updated 3 months ago
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆87Updated 2 years ago
- Cryptanalysis of Physically Unclonable Functions☆91Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆31Updated 2 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Updated 2 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Updated 7 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Updated 5 years ago
- A graphical user interface for measuring and performing inter-active analysis of physical unclonable functions (PUFs)☆27Updated 5 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆41Updated 2 weeks ago
- Repository to store all design and testbench files for Senior Design☆22Updated 5 years ago
- Side-Channel Analysis Library☆105Updated 5 months ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 4 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆20Updated 6 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Updated last year
- ☆54Updated last year
- This is a project in which side-channel attacks are researched and developed.☆51Updated 5 years ago
- VexRiscv reference platforms for the pqriscv project☆16Updated last year
- VHDL Implementation of AES Algorithm☆92Updated 4 years ago
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆95Updated 2 years ago
- Hardware Design of Ascon☆37Updated 2 weeks ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 4 years ago
- ARM Trusted Firmware☆35Updated 2 months ago
- Triple Modular Redundancy☆28Updated 6 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆46Updated 2 months ago
- ☆20Updated 7 years ago