igorauad / bchLinks
Bose–Chaudhuri–Hocquenghem Codes in Python
☆13Updated 2 years ago
Alternatives and similar repositories for bch
Users that are interested in bch are comparing it to the libraries listed below
Sorting:
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆20Updated 6 years ago
- Hardware designs for fault detection☆19Updated 5 years ago
- ☆26Updated 2 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Updated 4 years ago
- Defense/Attack PUF Library (DA PUF Library)☆55Updated 5 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆20Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆12Updated 5 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆36Updated last year
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Updated 7 years ago
- ☆25Updated 4 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Updated 5 years ago
- Hardware Security Labs☆31Updated 8 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- Circuit Synthesis for Yao's Garbled Circuit by TinyGarble☆11Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Updated last year
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Updated 6 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11Updated 8 years ago
- Designs of first-order SCA-secure hardware implementations of AES encryption/decryptoin dedicated to Xilinx FPGAs (using BRAM)☆16Updated 5 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Updated 8 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 3 years ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆65Updated 5 years ago
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆108Updated 3 years ago
- Cryptanalysis of Physically Unclonable Functions☆91Updated last year
- Side-channel analysis setup for OpenTitan☆37Updated 3 months ago
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Updated 5 years ago
- Side Channels Analysis and Deep Learning☆228Updated last month
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆43Updated this week
- Recursive unified ORAM☆15Updated 10 years ago
- Hardware implementation of ORAM☆24Updated 8 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Updated 7 months ago