anishathalye / knox-hsm
Circuits and hardware security modules formally verified with Knox ๐
โ24Updated last month
Alternatives and similar repositories for knox-hsm:
Users that are interested in knox-hsm are comparing it to the libraries listed below
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureโ31Updated 4 years ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities ๐โ33Updated last month
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Softwareโ36Updated last month
- High-order countermeasures for AES and DESโ25Updated 5 months ago
- XCrypto: a cryptographic ISE for RISC-Vโ92Updated 2 years ago
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verifiedโฆโ38Updated this week
- Crypto libraryโ55Updated 3 months ago
- โ18Updated 8 months ago
- โ10Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Acceleratorโ26Updated 4 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4โ10Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware accelerationโ34Updated 6 months ago
- Side-Channel Analysis Libraryโ78Updated last week
- Side-channel analysis setup for OpenTitanโ29Updated 2 weeks ago
- Hardware implementation of Saberโ7Updated 4 years ago
- Secure AES128 Encryption Implementation for ATmega8515โ34Updated 3 years ago
- A bitsliced implementation of ECB and CTR AESโ47Updated 5 months ago
- Minimal RISC Extensions for Isolated Executionโ51Updated 5 years ago
- MultiZoneยฎ Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'โฆโ83Updated last year
- A repository of tools for verifying constant-timenessโ14Updated last month
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyโ36Updated 3 years ago
- MLKEM implementation optimized for embedded microcontrollersโ15Updated 5 months ago
- High-assurance, high-performance C90 implementation of ML-KEMโ28Updated this week
- Demo host and enclave applications exercising most functionality.โ30Updated last year
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.โ127Updated 2 years ago
- โ15Updated 2 years ago
- cheriot-ibex is a RTL implementation of CHERIoT ISA based on LowRISC's Ibex core.โ89Updated last week
- This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant securโฆโ42Updated last month
- MAYO C implementationโ13Updated this week
- NewHope key exchange mechanism implementation on Cortex-M series microcontrollers.โ12Updated 8 years ago