NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks
☆20Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for ascon-hardware-sca
Users that are interested in ascon-hardware-sca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- A collection of Ascon implementations & documents (as submodules)☆54Dec 3, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An out-of-order, dual issueed RISC-V core and SOC, a working project.☆10Apr 24, 2023Updated 2 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- The hardware implementation of Poseidon hash function in SpinalHDL☆21Jun 5, 2022Updated 3 years ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Nov 27, 2024Updated last year
- Xilinx ZynqMP AXI-ACP Adapter☆20Mar 9, 2026Updated 2 weeks ago
- Artifact associated with CHES 2022 paper https://tches.iacr.org/index.php/TCHES/article/view/9817☆12Nov 10, 2023Updated 2 years ago
- ☆20Nov 18, 2022Updated 3 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆276Jan 28, 2026Updated last month
- ☆11Mar 10, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Testing greedy algorithms OMP and COSAMP using structured sparsity☆11May 24, 2021Updated 4 years ago
- ☆11Apr 12, 2018Updated 7 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 4 months ago
- ☆23Jul 3, 2024Updated last year
- ZPrize entry for Accelerating NTT Operations on an FPGA☆16Nov 18, 2022Updated 3 years ago
- ☆26Nov 14, 2025Updated 4 months ago
- 586 compatible soft core for FPGA in verilog with AXI4 interface☆15Oct 15, 2016Updated 9 years ago
- rust wrapper for libyubihsm☆15Updated this week
- SCARIF is a tool to estimate the embodied carbon emissions of data center servers with accelerator hardware (GPUs, FPGAs, etc.)☆15Mar 20, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20May 26, 2016Updated 9 years ago
- Image Reconstruction Using Compressive Sensing☆22Dec 17, 2019Updated 6 years ago
- This program is an analogy engine designed to determine if a drink is prohibited based on its attributes and by comparing it to a databas…☆12Aug 19, 2023Updated 2 years ago
- ☆84Nov 18, 2025Updated 4 months ago
- A GO module of the Security Content Automation Protocol (SCAP) Specification☆16Dec 1, 2025Updated 3 months ago
- MIPI CSI-2 Camera Sensor Receiver V2 Verilog HDL implementation For any generic FPGA. Tested with IMX219 IMX477 on Lattice Crosslink NX w…☆65Feb 13, 2025Updated last year
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- Cross EDA Abstraction and Automation☆41Nov 17, 2025Updated 4 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ansible role to automatically join an Ubuntu/CentOS box to an Active Directory using winbind☆10Jul 30, 2018Updated 7 years ago
- An Erlang implementation of the syslog server protocol☆41Mar 6, 2011Updated 15 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- ☆26Nov 3, 2020Updated 5 years ago
- A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts☆20Mar 30, 2025Updated 11 months ago
- Computer Graphics Course (COMP130018.01, 2023 Spring) Project of Fudan University.☆14Aug 4, 2023Updated 2 years ago
- A tiny tool for embedding CoSWID tags in EFI binaries☆26Mar 16, 2026Updated last week