hgrosz / aes-dom
DOM Protected Hardware Implementation of AES
☆18Updated 8 years ago
Alternatives and similar repositories for aes-dom:
Users that are interested in aes-dom are comparing it to the libraries listed below
- Masked Hardware AES with HPC☆11Updated 3 months ago
- ☆47Updated 3 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆48Updated 2 years ago
- Hardware implementation of Saber☆7Updated 4 years ago
- ☆16Updated 3 years ago
- This repository is for our paper "High-Performance and Configurable SW/HW Co-design of Post-Quantum Signature CRYSTALS-Dilithium" in ACM …☆10Updated last year
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆28Updated 3 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆24Updated last year
- David Canright's tiny AES S-boxes☆22Updated 10 years ago
- Reference implementation for the COherent Sampling ring Oscillator based True Random Number Generator.☆12Updated last month
- SILVER - Statistical Independence and Leakage Verification☆13Updated 2 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- ☆20Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆30Updated 5 months ago
- ☆10Updated last year
- Parametric NTT/INTT Hardware Generator☆65Updated 3 years ago
- ☆14Updated last month
- Side-Channel Analysis Library☆77Updated last week
- A Verilog (specifically, System Verilog) implementation of the not-yet-finalized SHA-3 winner, Keccak.☆9Updated 3 years ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆31Updated 4 years ago
- Verilog Hardware Design of Ascon v1.2☆20Updated last month
- Cryptanalysis of Physically Unclonable Functions☆81Updated 6 months ago
- ☆18Updated 6 months ago
- ☆13Updated 2 months ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆9Updated last week
- Automated Generation of Masked Hardware☆18Updated 8 months ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- ☆10Updated last year