anishathalye / knox-hsmLinks
Circuits and hardware security modules formally verified with Knox ๐
โ27Updated last year
Alternatives and similar repositories for knox-hsm
Users that are interested in knox-hsm are comparing it to the libraries listed below
Sorting:
- XCrypto: a cryptographic ISE for RISC-Vโ92Updated 3 years ago
- Side-Channel Analysis Libraryโ105Updated 5 months ago
- โ12Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureโ31Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2โ31Updated 2 years ago
- This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory protโฆโ96Updated last week
- MultiZoneยฎ Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'โฆโ87Updated 2 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.โ138Updated 3 years ago
- cheriot-ibex is a RTL implementation of CHERIoT ISA based on LowRISC's Ibex core.โ119Updated 5 months ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationโ46Updated 2 months ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Acceleratorโ39Updated 10 months ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities ๐โ40Updated 2 months ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and SoftwareใใใใใใใใใใใใใFIESTA - Fault Injection Evaluation with Statisticโฆโ41Updated last week
- Secure AES128 Encryption Implementation for ATmega8515โ35Updated 4 years ago
- Crypto libraryโ67Updated last month
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementationsโ49Updated 7 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)โ60Updated 7 months ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4โ37Updated 4 years ago
- โ10Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functionsโ91Updated last year
- โ54Updated last year
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.โ14Updated 8 years ago
- ๐ฒ A Tiny and Platform-Independent True Random Number Generator for any FPGA (and ASIC).โ213Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203โ132Updated this week
- Sail code model of the CHERIoT ISAโ48Updated last month
- โ22Updated last year
- Lean cryptographic library usable for bare-metal environmentsโ81Updated last week
- Verifying OpenTitanโ28Updated 2 years ago
- A repository of tools for verifying constant-timenessโ19Updated 11 months ago
- CocoAlma is an execution-aware tool for formal verification of masked implementationsโ24Updated last year