hgrosz / aes-dom
DOM Protected Hardware Implementation of AES
☆15Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for aes-dom
- Masked Hardware AES with HPC☆10Updated last month
- ☆45Updated 3 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆43Updated last year
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆25Updated 2 years ago
- Hardware implementation of Saber☆7Updated 4 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆12Updated this week
- ☆16Updated 3 years ago
- Post-quantum crypto library for the ARM Cortex-M4☆296Updated last week
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆9Updated 3 weeks ago
- ☆18Updated 2 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- SILVER - Statistical Independence and Leakage Verification☆12Updated last year
- David Canright's tiny AES S-boxes☆21Updated 10 years ago
- Side-Channel Analysis Library☆74Updated 2 months ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆24Updated last year
- ☆10Updated last year
- Saber and NTRU on M4 and AVX2☆16Updated 2 years ago
- Parametric NTT/INTT Hardware Generator☆59Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆10Updated last year
- ☆13Updated 3 weeks ago
- A list of VHDL codes implementing cryptographic algorithms☆25Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆29Updated 4 months ago
- ☆24Updated 3 months ago
- XCrypto: a cryptographic ISE for RISC-V☆92Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆22Updated last month
- Verilog implementation of the symmetric block cipher AES (Advanced Encryption Standard) as specified in NIST FIPS 197. This implementatio…☆337Updated last month
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated last month
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- Side-channel analysis setup for OpenTitan☆28Updated 2 months ago