hgrosz / aes-domLinks
DOM Protected Hardware Implementation of AES
☆22Updated 9 years ago
Alternatives and similar repositories for aes-dom
Users that are interested in aes-dom are comparing it to the libraries listed below
Sorting:
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆60Updated 2 years ago
- ☆59Updated 4 years ago
- Masked Hardware AES with HPC☆13Updated 2 weeks ago
- ☆19Updated 4 years ago
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆10Updated last year
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆36Updated 3 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆13Updated 9 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆366Updated last month
- Side-Channel Analysis Library☆96Updated last week
- ☆10Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆27Updated 2 years ago
- Verilog implementation of the symmetric block cipher AES (Advanced Encryption Standard) as specified in NIST FIPS 197. This implementatio…☆383Updated 4 months ago
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- SILVER - Statistical Independence and Leakage Verification☆14Updated 2 months ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated last month
- Parametric NTT/INTT Hardware Generator☆73Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆12Updated last year
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- ☆24Updated 3 years ago
- ☆11Updated last year
- Dilithium is a digital signature scheme that is strongly secure under chosen message attacks based on the hardness of lattice problems ov…☆15Updated 2 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- Hardware implementation of the SHA-256 cryptographic hash function☆352Updated last month
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆10Updated 4 years ago
- Saber and NTRU on M4 and AVX2☆17Updated 3 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆33Updated last week
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆11Updated 3 years ago
- ☆51Updated last year
- processor for post-quantum cryptography☆16Updated 5 years ago