igorauad / bch
Bose–Chaudhuri–Hocquenghem Codes in Python
☆11Updated last year
Alternatives and similar repositories for bch
Users that are interested in bch are comparing it to the libraries listed below
Sorting:
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Updated 4 years ago
- A Python implementation of fuzzy extractor.☆58Updated last year
- BCH library C Python module☆101Updated 8 months ago
- Simple python implementation of binary BCH error-correcting code☆30Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆10Updated 5 years ago
- Correlation Power Analysis☆13Updated 6 years ago
- FPGA implementation of a physical unclonable function for authentication☆32Updated 8 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆28Updated 3 years ago
- ☆21Updated last year
- Defense/Attack PUF Library (DA PUF Library)☆49Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆45Updated 5 years ago
- Tools for PUF analysis☆11Updated 3 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆23Updated 7 years ago
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆11Updated 5 years ago
- This repo contains the source code of the physical layer developed for the DARPA Spectrum Collaboration Challenge (SC2).☆10Updated 5 years ago
- Error Correction Codes - C☆11Updated 5 years ago
- Repository to store all design and testbench files for Senior Design☆18Updated 5 years ago
- A Performance Analysis and Simulation of BCH Code in Matlab☆13Updated 3 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆17Updated 4 years ago
- ☆22Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functions☆86Updated 10 months ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆24Updated this week
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Updated 4 years ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Updated 5 months ago
- ☆22Updated 3 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆31Updated last year
- ☆21Updated 10 months ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆17Updated 2 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆23Updated last month