erdemalkim / newhopearmLinks
ARM Cortex-M implementation of NewHope Ring-LWE based Key-exchange
☆9Updated 9 years ago
Alternatives and similar repositories for newhopearm
Users that are interested in newhopearm are comparing it to the libraries listed below
Sorting:
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆91Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆47Updated last month
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆69Updated 2 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- ☆11Updated last year
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆39Updated last week
- A free and open source tool for Deep Learning Side Channel Analysis☆16Updated 5 years ago
- The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM☆97Updated 3 months ago
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆26Updated last year
- NewHope key exchange mechanism implementation on Cortex-M series microcontrollers.☆13Updated 9 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Updated 4 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Hardware designs for fault detection☆18Updated 5 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆35Updated 4 months ago
- Cross-Domain DPA Attack on SAML11☆16Updated 6 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 6 years ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- The SP800-90B_EntropyAssessment C++package implements the min-entropy assessment methods included in Special Publication 800-90B.☆220Updated 2 months ago
- MLKEM implementation optimized for embedded microcontrollers☆25Updated 11 months ago
- Masked Ascon Software Implementations☆11Updated 3 years ago
- High-order countermeasures for AES and DES☆25Updated last year
- Cryptanalysis of Physically Unclonable Functions☆87Updated last year
- IP submodules, formatted for easier CI integration☆30Updated last week
- ☆56Updated last year
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆27Updated last year
- Implementations of some lightweight block ciphers in C☆19Updated 7 years ago
- Hardware Design of Ascon☆23Updated 2 weeks ago