anishathalye / knox-hsm
Circuits and hardware security modules formally verified with Knox π
β24Updated last month
Alternatives and similar repositories for knox-hsm:
Users that are interested in knox-hsm are comparing it to the libraries listed below
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureβ31Updated 4 years ago
- Secure AES128 Encryption Implementation for ATmega8515β34Updated 4 years ago
- β10Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Acceleratorβ26Updated 5 months ago
- Side-Channel Analysis Libraryβ78Updated this week
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities πβ33Updated last month
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verifiedβ¦β43Updated 2 weeks ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationβ35Updated 7 months ago
- XCrypto: a cryptographic ISE for RISC-Vβ92Updated 2 years ago
- Verifying OpenTitanβ25Updated last year
- Crypto libraryβ55Updated 3 weeks ago
- β18Updated 9 months ago
- β12Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollersβ16Updated 6 months ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Softwareβ36Updated this week
- Side-channel analysis setup for OpenTitanβ29Updated 2 weeks ago
- High-order countermeasures for AES and DESβ25Updated 7 months ago
- A repository of tools for verifying constant-timenessβ16Updated 3 weeks ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4β11Updated last year
- High-assurance, high-performance C90 implementation of ML-KEMβ36Updated this week
- NIST LWC Hardware Reference Implementation of Ascon v1.2β25Updated last year
- MAYO C implementationβ14Updated this week
- Development Package for the Hardware API for Lightweight Cryptographyβ15Updated last year
- β15Updated 2 years ago
- Demo host and enclave applications exercising most functionality.β32Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidatesβ25Updated last week
- Fast constant-time AES implementations on 32-bit architecturesβ64Updated 4 months ago
- betrusted.io main SoC designβ12Updated 5 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyβ36Updated 3 years ago
- β47Updated 9 months ago