Masked Ascon Software Implementations
☆13May 3, 2022Updated 3 years ago
Alternatives and similar repositories for simpleserial-ascon
Users that are interested in simpleserial-ascon are comparing it to the libraries listed below
Sorting:
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- Hardware Design of Ascon☆39Jan 20, 2026Updated 2 months ago
- ☆12Jan 13, 2025Updated last year
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆95Oct 19, 2023Updated 2 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Implementation of the Snappy compression algorithm as a RoCC accelerator☆12Jul 29, 2019Updated 6 years ago
- ☆55May 13, 2024Updated last year
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 3 months ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- ☆19Jan 25, 2021Updated 5 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 9 months ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- ☆21Nov 2, 2022Updated 3 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- A simple implementation of the UDP (User Datagram Protocol) client-server program in the C programming language.☆10Dec 26, 2021Updated 4 years ago
- Code for the project☆22Mar 23, 2021Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- AdderNet ResNet20 for cifar10 written in SpinalHDL☆35Mar 14, 2021Updated 5 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- Implementation of the Advanced Encryption Standard in Chisel☆19Apr 18, 2022Updated 3 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago