datenlord / TRIDENT
A Hardware Implemented Poseidon Hasher
☆18Updated 2 years ago
Related projects: ⓘ
- The hardware implementation of Poseidon hash function in SpinalHDL☆16Updated 2 years ago
- FIPS 202 compliant SHA-3 core in Verilog☆17Updated 3 years ago
- Chisel module for performing Multi-Scalar Multiplication☆12Updated 2 years ago
- An acceleration engine for proving SNARKS over the bn128 curve, targeted for AWS FPGAs☆52Updated 4 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆25Updated 6 months ago
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆15Updated 3 weeks ago
- ☆11Updated 2 weeks ago
- ☆14Updated 2 months ago
- Implementation of Number-theoretic transform(NTT) algorithm on FPGA; 快速数论变换(NTT)的FPGA实现,基为2,有两个并行的蝶形单元☆12Updated 2 years ago
- ☆22Updated last month
- processor for post-quantum cryptography☆14Updated 4 years ago
- Acceleration of TFHE-based Homomorphic NAND Gate on FPGA☆13Updated 3 years ago
- Zcash FPGA acceleration engine☆117Updated 4 years ago
- Implementation of an RSA VDF evaluator targeting FPGAs.☆47Updated 4 years ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆53Updated 4 years ago
- VexRiscv reference platforms for the pqriscv project☆15Updated 6 months ago
- Hardcaml_zprize implements high performance, open source cryptographic solutions for large scale number theoretic transforms (NTT) and mu…☆51Updated 2 months ago
- Verilog HDL implementation of Elliptic Curve Cryptography (ECC) over GF(2^163)☆15Updated 6 years ago
- ☆19Updated 3 years ago
- Implementation of ECC on FPGA-Zynq7000 SoC☆16Updated 5 years ago
- Welcome to the GPU-NTT-Optimization repository! We present cutting-edge algorithms and implementations for optimizing the Number Theoreti…☆14Updated 5 months ago
- Hardware implementation of ORAM☆21Updated 7 years ago
- FPGA implementation of a physical unclonable function for authentication☆31Updated 7 years ago
- ☆15Updated 11 months ago
- A list of VHDL codes implementing cryptographic algorithms☆25Updated 2 years ago
- ☆20Updated last year
- ☆11Updated this week
- ☆13Updated 3 years ago
- Defense/Attack PUF Library (DA PUF Library)☆45Updated 4 years ago
- ☆12Updated 9 years ago