lennartbublies / ecdsaView external linksLinks
ECDSA VHDL Implementation
☆12Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for ecdsa
Users that are interested in ecdsa are comparing it to the libraries listed below
Sorting:
- Elgamal's over Elliptic Curves☆20Dec 22, 2018Updated 7 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- ☆19Apr 20, 2018Updated 7 years ago
- a 2048 bit RSA verilog project basing on Montgomery , Karatsuba multiplier☆25Mar 11, 2022Updated 3 years ago
- Verilog HDL implementation of Elliptic Curve Cryptography (ECC) over GF(2^163)☆22Oct 31, 2017Updated 8 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- ☆27Feb 8, 2022Updated 4 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆46Nov 24, 2025Updated 2 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- gcnano-binaries☆11Nov 27, 2025Updated 2 months ago
- ☆10Oct 11, 2020Updated 5 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 6 years ago
- Python library for Alphanov's PDM laser sources control☆13Jan 16, 2026Updated 3 weeks ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- ☆12Jan 13, 2022Updated 4 years ago
- V2Verifer is an open-source project dedicated to wireless experimentation focused on the security of vehicle-to-vehicle (V2V) communicati…☆41Apr 24, 2025Updated 9 months ago
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 7 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 6 months ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆10Feb 26, 2021Updated 4 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆15Jan 6, 2026Updated last month
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆14Sep 16, 2020Updated 5 years ago
- Atom One Dark syntax scheme for Qt Creator☆11Jan 13, 2024Updated 2 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- C implementation of the Kohonen Neural Network (SOM algorithm)☆10May 5, 2019Updated 6 years ago
- TUM EI7402 SystemC laboratory assignments☆11Aug 10, 2021Updated 4 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago