isec-tugraz / ascon_hardwareLinks
Hardware implementations of the authenticated encryption design ASCON
☆19Updated 7 years ago
Alternatives and similar repositories for ascon_hardware
Users that are interested in ascon_hardware are comparing it to the libraries listed below
Sorting:
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆26Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆54Updated 2 years ago
- Masked Ascon Software Implementations☆11Updated 3 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆17Updated 2 years ago
- ☆11Updated last year
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆38Updated 2 months ago
- A bitsliced implementation of ECB and CTR AES☆52Updated 10 months ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆22Updated 8 months ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆37Updated 4 years ago
- ☆55Updated 11 months ago
- David Canright's tiny AES S-boxes☆24Updated 10 years ago
- ☆19Updated 4 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆18Updated 5 years ago
- Side-Channel Analysis Library☆90Updated 3 weeks ago
- Verilog Hardware Design of Ascon☆22Updated last week
- masked, bit-sliced AES-128 demo code☆14Updated 4 months ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- MLKEM implementation optimized for embedded microcontrollers☆22Updated 9 months ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆61Updated 4 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- SILVER - Statistical Independence and Leakage Verification☆14Updated 2 years ago
- ☆16Updated 2 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆28Updated this week
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 3 years ago
- MAYO C implementation☆16Updated 2 months ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- Masked Hardware AES with HPC☆13Updated 7 months ago
- ☆21Updated 11 months ago