aneeshkandi14 / ascon-hw-publicView external linksLinks
☆22Jul 3, 2024Updated last year
Alternatives and similar repositories for ascon-hw-public
Users that are interested in ascon-hw-public are comparing it to the libraries listed below
Sorting:
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Nov 27, 2024Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆31Aug 29, 2023Updated 2 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated 10 months ago
- ESP32-NOW with Wifi☆23Apr 11, 2025Updated 10 months ago
- Implementation of the Advanced Encryption Standard in Chisel☆19Apr 18, 2022Updated 3 years ago
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Nov 24, 2017Updated 8 years ago
- Present Crypto Engine in Verilog☆11Feb 27, 2016Updated 9 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Apr 7, 2017Updated 8 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆12Apr 1, 2020Updated 5 years ago
- WebRTCを使ってブラウザ間通信を行うオンセツール ユドナリウムの変更版ユドナリウムリリィです☆18Jan 22, 2026Updated 3 weeks ago
- A risc-v simulator based on SystrmC☆14Jan 7, 2022Updated 4 years ago
- ☆11Nov 10, 2025Updated 3 months ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- CrazyDiskInfo is an interactive TUI S.M.A.R.T viewer for Unix systems.☆10Aug 9, 2022Updated 3 years ago
- A copy of the latest version of MVSIS☆12Apr 18, 2021Updated 4 years ago
- Hardware-backed biometric authentication for Flutter. Create cryptographic signatures using device biometrics with keys stored in Secure …☆15Feb 6, 2026Updated last week
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- Bose–Chaudhuri–Hocquenghem Codes in Python☆13May 15, 2023Updated 2 years ago
- Android 姿势整理和音视频方向☆12Dec 5, 2020Updated 5 years ago
- RISC-V Confidential VM Extension☆13Jan 14, 2026Updated last month
- 文档编写☆13Sep 19, 2020Updated 5 years ago
- A library for lattice-based homomorphic encryption in Go☆14May 15, 2022Updated 3 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Sep 18, 2020Updated 5 years ago
- A Verilog implementation of a hand-written digit recognition Neural Network☆10Nov 16, 2024Updated last year
- A modular library for designing and optimising homomorphic encryption schemes☆22Feb 6, 2026Updated last week
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- 一个把教务处课程表转换成日历的小工具☆10Nov 26, 2021Updated 4 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Dynex has also developed a proprietary circuit design, the Dynex Neuromorphic Chip, that complements the Dynex ecosystem and turns any mo…☆15May 26, 2023Updated 2 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆16May 2, 2024Updated last year
- Implementation of the Snappy compression algorithm as a RoCC accelerator☆12Jul 29, 2019Updated 6 years ago
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆13Nov 1, 2025Updated 3 months ago
- Experimental port of the TFHE fully homomorphic encryption scheme to Rust.☆12Aug 15, 2022Updated 3 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 3 years ago
- Memory Compiler Tutorial☆14Aug 2, 2022Updated 3 years ago
- A basic implementation of a SAT attack on logic locking.☆13Jun 30, 2021Updated 4 years ago
- 破解我的世界禁止多人游戏的限制☆10Jun 9, 2023Updated 2 years ago