igorauad / bchLinks
Bose–Chaudhuri–Hocquenghem Codes in Python
☆13Updated 2 years ago
Alternatives and similar repositories for bch
Users that are interested in bch are comparing it to the libraries listed below
Sorting:
- Hardware designs for fault detection☆18Updated 5 years ago
- Hardware Security Labs☆30Updated 8 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆13Updated last year
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆33Updated last year
- Hardware Design of Ascon☆25Updated this week
- Defense/Attack PUF Library (DA PUF Library)☆51Updated 5 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 4 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- This is a project in which side-channel attacks are researched and developed.☆47Updated 5 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆23Updated 7 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆23Updated last year
- Cross-Domain DPA Attack on SAML11☆17Updated 6 years ago
- ☆23Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆18Updated 4 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Updated 6 months ago
- Circuit Synthesis for Yao's Garbled Circuit by TinyGarble☆11Updated 5 years ago
- Open Source AES☆31Updated last week
- Decision Trees Inference☆14Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Updated 9 months ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆19Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆12Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functions☆88Updated last year
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Updated 5 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Updated 4 years ago
- HeteroSim is a full system simulator supporting x86 multicore processors combined with a FPGA via bus-based architecture. Flexible design…☆21Updated 9 years ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Updated 10 months ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Updated 2 years ago
- Correlation Power Analysis☆13Updated 7 years ago
- An Implementation of the Number Theoretic Transform☆48Updated 2 years ago