igorauad / bch
Bose–Chaudhuri–Hocquenghem Codes in Python
☆11Updated last year
Alternatives and similar repositories for bch:
Users that are interested in bch are comparing it to the libraries listed below
- ☆21Updated 5 years ago
- ☆21Updated 8 months ago
- A Python implementation of fuzzy extractor.☆57Updated last year
- Defense/Attack PUF Library (DA PUF Library)☆48Updated 4 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆31Updated last year
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆21Updated 7 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆20Updated this week
- This is a project in which side-channel attacks are researched and developed.☆45Updated 4 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆16Updated 4 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆28Updated 3 years ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆58Updated 4 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆10Updated 5 years ago
- Hardware implementation of ORAM☆22Updated 7 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software☆38Updated this week
- FPGA implementation of a physical unclonable function for authentication☆32Updated 7 years ago
- Cryptanalysis of Physically Unclonable Functions☆84Updated 9 months ago
- Repository to store all design and testbench files for Senior Design☆18Updated 4 years ago
- ☆21Updated 3 years ago
- Implementation of ECC on FPGA-Zynq7000 SoC☆17Updated 5 years ago
- Security Test Benchmark for Computer Architectures☆20Updated last month
- Recursive unified ORAM☆14Updated 9 years ago
- ☆47Updated 10 months ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆18Updated 5 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated 6 months ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆9Updated 4 months ago
- Hardware Security Labs☆30Updated 7 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆39Updated 4 years ago
- ☆20Updated last year
- CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)☆23Updated 7 years ago
- An Implementation of the Number Theoretic Transform☆43Updated last year