anishathalye / knox-hsm
Circuits and hardware security modules formally verified with Knox π
β23Updated 3 months ago
Alternatives and similar repositories for knox-hsm
Users that are interested in knox-hsm are comparing it to the libraries listed below
Sorting:
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureβ31Updated 4 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Softwareβ39Updated this week
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities πβ33Updated 3 months ago
- Side-Channel Analysis Libraryβ89Updated last week
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationβ38Updated last month
- Secure AES128 Encryption Implementation for ATmega8515β35Updated 4 years ago
- XCrypto: a cryptographic ISE for RISC-Vβ93Updated 2 years ago
- β11Updated last year
- A repository of tools for verifying constant-timenessβ18Updated 3 months ago
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verifiedβ¦β51Updated this week
- Side-channel analysis setup for OpenTitanβ32Updated 3 weeks ago
- Fast constant-time AES implementations on 32-bit architecturesβ64Updated 7 months ago
- β48Updated last year
- This is the repository for the first-order masked Kyber on ARM Cortex-M4β12Updated last year
- β15Updated 2 years ago
- β18Updated 11 months ago
- Masked Hardware AES with HPCβ13Updated 6 months ago
- Power trace simulator using Unicorn Engine for side channel analysis attack testingβ87Updated 6 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementationsβ49Updated 6 years ago
- Development Package for the Hardware API for Lightweight Cryptographyβ16Updated last month
- Crypto libraryβ59Updated 2 weeks ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paperβ82Updated 3 years ago
- Verifying OpenTitanβ26Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203β59Updated this week
- β12Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.β59Updated last month
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyβ35Updated 4 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)β46Updated 3 months ago
- CocoAlma is an execution-aware tool for formal verification of masked implementationsβ22Updated 7 months ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Acceleratorβ32Updated 2 months ago