GM/T serial standards implementations
☆18Mar 11, 2022Updated 3 years ago
Alternatives and similar repositories for SM2349
Users that are interested in SM2349 are comparing it to the libraries listed below
Sorting:
- C code implementation of Chinese SM9 standard☆25Updated this week
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- 基于Miracl的国密算法SM9实现☆76Apr 10, 2023Updated 2 years ago
- RISC-V instruction set extensions for SM4 block cipher☆21Mar 6, 2020Updated 5 years ago
- A very small SM2 implementation for 8-bit microcontrollers☆38Mar 13, 2017Updated 8 years ago
- 不依赖第三方库实现国密SM2、SM3、SM4算法☆49Jul 30, 2023Updated 2 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Verilog Implementation of modular exponentiation using Montgomery multiplication☆37Sep 25, 2014Updated 11 years ago
- Port of the LLVM compiler infrastructure to the time-predictable processor Patmos☆15Apr 2, 2025Updated 11 months ago
- MMA845X driver for ESP-IDF (ESP32)☆10Jan 21, 2018Updated 8 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Feb 4, 2021Updated 5 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆11Sep 26, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆16Oct 19, 2025Updated 4 months ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 4 months ago
- Yet another implementation of TI C6x DSP simulator☆12Jan 16, 2014Updated 12 years ago
- ☆10Feb 26, 2021Updated 5 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆18Feb 20, 2026Updated last week
- Verilog VPI VGA Simulator using SDL☆11Feb 9, 2015Updated 11 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- ☆12Aug 4, 2025Updated 7 months ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Simple IIO FM Radio receive example☆16Feb 23, 2026Updated last week
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 11 months ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- Implementation of cryptographic algorithm with verilog hdl(such as des,aes,sha,rsa,ecc etc.)☆43Dec 1, 2019Updated 6 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- SystemVerilog Example Files☆11Jan 15, 2013Updated 13 years ago
- opsi-script aka. opsi-winst and other various tools.☆10Updated this week
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- The best AES cipher built upon tiny-aes-c. Replace tiny-aes-c code blocks with something else if you want to run it on enterprise servers…☆11Mar 29, 2025Updated 11 months ago