caslab-code / pqc-hqc-hardwareLinks
☆12Updated 2 years ago
Alternatives and similar repositories for pqc-hqc-hardware
Users that are interested in pqc-hqc-hardware are comparing it to the libraries listed below
Sorting:
- ☆10Updated 5 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆71Updated 3 years ago
- ☆59Updated 4 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Updated last month
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆38Updated 3 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆41Updated 2 weeks ago
- Parametric NTT/INTT Hardware Generator☆78Updated 4 years ago
- ☆12Updated 3 years ago
- processor for post-quantum cryptography☆17Updated 5 years ago
- ☆36Updated last year
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆17Updated 2 years ago
- ☆23Updated last year
- ☆25Updated 3 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated 5 months ago
- ☆26Updated 5 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆19Updated 2 years ago
- Griffinfly is COSIC's submission to the ZPRIZE competition under the category, Accelerating NTT Operations on an FPGA by Michiel Van Beir…☆11Updated 2 years ago
- Verilog implementation of the symmetric block cipher AES (Advanced Encryption Standard) as specified in NIST FIPS 197. This implementatio…☆402Updated last week
- ☆21Updated last year
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 8 years ago
- ☆28Updated 4 months ago
- Hardware Design of Ascon☆29Updated 2 months ago
- ☆13Updated 2 years ago
- Side-Channel Analysis Library☆104Updated 4 months ago
- Saber and NTRU on M4 and AVX2☆18Updated 3 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆30Updated 2 years ago
- DOM Protected Hardware Implementation of AES☆25Updated 9 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Updated 4 years ago
- ☆19Updated 4 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 4 years ago