anishathalye / knox-hsmLinks
Circuits and hardware security modules formally verified with Knox ๐
โ25Updated 9 months ago
Alternatives and similar repositories for knox-hsm
Users that are interested in knox-hsm are comparing it to the libraries listed below
Sorting:
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities ๐โ36Updated 9 months ago
- XCrypto: a cryptographic ISE for RISC-Vโ92Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureโ31Updated 5 years ago
- This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory protโฆโ83Updated this week
- MultiZoneยฎ Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'โฆโ86Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Acceleratorโ39Updated 7 months ago
- โ11Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationโ45Updated last week
- cheriot-ibex is a RTL implementation of CHERIoT ISA based on LowRISC's Ibex core.โ113Updated 2 months ago
- Side-Channel Analysis Libraryโ102Updated 2 months ago
- CHERI-RISC-V model written in Sailโ65Updated 3 months ago
- Verifying OpenTitanโ27Updated 2 years ago
- Secure AES128 Encryption Implementation for ATmega8515โ35Updated 4 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4โ36Updated 4 years ago
- A repository of tools for verifying constant-timenessโ18Updated 8 months ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyโ35Updated 4 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.โ134Updated 2 years ago
- โ16Updated 2 years ago
- Instruction and files for porting Arm DesignStart to CW305.โ14Updated last year
- Sail code model of the CHERIoT ISAโ45Updated last week
- Formal specification and verification of hardware, especially for security and privacy.โ127Updated 3 years ago
- โ19Updated last year
- Crypto libraryโ66Updated last week
- Sail version of Arm ISA definition, currently for Armv9.3-A, and with the previous Sail Armv8.5-A modelโ89Updated last week
- Artifacts for Cascade: CPU Fuzzing via Intricate Program Generation (USENIX Security 2024)โ137Updated last year
- Demo host and enclave applications exercising most functionality.โ31Updated 2 years ago
- Exploring the Ed25519 (FPGA) design space.โ17Updated 7 years ago
- โ52Updated last year
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and SoftwareใใใใใใใใใใใใใFIESTA - Fault Injection Evaluation with Statisticโฆโ41Updated this week
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementationsโ49Updated 7 years ago