jubayer0175 / IoT-device-authentication-schemeLinks
This repo contains the PUF and authentication codes for IoT authentication protocol development project
☆11Updated 5 years ago
Alternatives and similar repositories for IoT-device-authentication-scheme
Users that are interested in IoT-device-authentication-scheme are comparing it to the libraries listed below
Sorting:
- FPGA implementation of a physical unclonable function for authentication☆32Updated 8 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆10Updated 5 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆17Updated 4 years ago
- Ring Oscillator Physically Unclonable Funtion☆23Updated 3 years ago
- Defense/Attack PUF Library (DA PUF Library)☆50Updated 5 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆10Updated 4 years ago
- A graphical user interface for measuring and performing inter-active analysis of physical unclonable functions (PUFs)☆26Updated 4 years ago
- Implementation of Number-theoretic transform(NTT) algorithm on FPGA; 快速数论变换(NTT)的FPGA实现,基为2,有两个并行的蝶形单元☆19Updated 2 years ago
- ☆24Updated 3 years ago
- The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM☆95Updated last month
- Python Code and Dataset for different PUFs☆18Updated 4 years ago
- An end-to-end chip authentication architecture based on SRAM PUF and public key cryptography.☆17Updated 5 years ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆31Updated last year
- Tools for PUF analysis☆11Updated 3 years ago
- ☆21Updated 11 months ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆23Updated 7 years ago
- Cryptanalysis of Physically Unclonable Functions☆87Updated 11 months ago
- ☆35Updated 10 months ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Updated 6 months ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆37Updated 4 years ago
- 🚀 Leveraging advanced RNN with LSTM for efficient, real-time anomaly detection in IoT networks, optimized for performance in resource-co…☆9Updated last year
- ☆22Updated 3 years ago
- ☆22Updated 9 months ago
- ☆26Updated 4 years ago
- Implementation of ECC on FPGA-Zynq7000 SoC☆18Updated 5 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆15Updated 7 years ago
- A final semester based group project for EE4218: Embedded Hardware System Design module in NUS where I worked with my teammate to perform…☆15Updated 2 years ago
- Repository to store all design and testbench files for Senior Design☆17Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆46Updated 5 years ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆61Updated 4 years ago