anishathalye / knox-hsm
Circuits and hardware security modules formally verified with Knox π
β24Updated 2 months ago
Alternatives and similar repositories for knox-hsm:
Users that are interested in knox-hsm are comparing it to the libraries listed below
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities πβ33Updated 2 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureβ31Updated 4 years ago
- This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory protβ¦β64Updated this week
- Verifying OpenTitanβ25Updated last year
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyβ35Updated 3 years ago
- β10Updated last year
- XCrypto: a cryptographic ISE for RISC-Vβ92Updated 2 years ago
- Exploring the Ed25519 (FPGA) design space.β16Updated 7 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Softwareβ38Updated last week
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.β130Updated 2 years ago
- CHERI-RISC-V model written in Sailβ58Updated last week
- Minimal OpenMSP430 hardware extensions for isolation and attestationβ21Updated last year
- β18Updated 10 months ago
- Formal specification and verification of hardware, especially for security and privacy.β125Updated 2 years ago
- A repository of tools for verifying constant-timenessβ18Updated last month
- A full micro-controller system utilizing the CHERIoT Ibex core, part of the Sunburst project funded by UKRIβ37Updated last week
- β16Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationβ38Updated last week
- Side-channel analysis setup for OpenTitanβ30Updated 2 weeks ago
- CocoAlma is an execution-aware tool for formal verification of masked implementationsβ21Updated 6 months ago
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant securβ¦β47Updated last week
- Iodine: Verifying Constant-Time Execution of Hardwareβ12Updated 4 years ago
- An Implementation of the Number Theoretic Transformβ44Updated last year
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verifiedβ¦β44Updated this week
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.β12Updated 4 months ago
- Code repository for Coppelia toolβ23Updated 4 years ago
- cheriot-ibex is a RTL implementation of CHERIoT ISA based on LowRISC's Ibex core.β100Updated last week
- Fast constant-time AES implementations on 32-bit architecturesβ64Updated 5 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4β11Updated last year
- Crypto libraryβ57Updated 3 weeks ago