ECDSA VHDL Implementation
☆12Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for ecdsa
Users that are interested in ecdsa are comparing it to the libraries listed below
Sorting:
- Elgamal's over Elliptic Curves☆20Dec 22, 2018Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- ☆19Apr 20, 2018Updated 7 years ago
- a 2048 bit RSA verilog project basing on Montgomery , Karatsuba multiplier☆25Mar 11, 2022Updated 3 years ago
- Verilog HDL implementation of Elliptic Curve Cryptography (ECC) over GF(2^163)☆22Oct 31, 2017Updated 8 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last month
- ☆27Feb 8, 2022Updated 4 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆46Nov 24, 2025Updated 3 months ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆16Oct 19, 2025Updated 4 months ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- ☆12Jan 13, 2022Updated 4 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- V2Verifer is an open-source project dedicated to wireless experimentation focused on the security of vehicle-to-vehicle (V2V) communicati…☆41Apr 24, 2025Updated 10 months ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- Flexible Open-source workBench fOr Side-channel analysis (FOBOS)☆13Nov 19, 2025Updated 3 months ago
- ☆11Oct 28, 2020Updated 5 years ago
- C implementation of the Kohonen Neural Network (SOM algorithm)☆11May 5, 2019Updated 6 years ago
- Forked from upstream: http://sourceforge.net/projects/osslsigncode/☆11Dec 27, 2021Updated 4 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆10Dec 12, 2021Updated 4 years ago
- ☆10May 10, 2019Updated 6 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- C library that mimics the Minecraft biome generation.☆10Jun 20, 2020Updated 5 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago