nils-wisiol / pypufLinks
Cryptanalysis of Physically Unclonable Functions
☆88Updated last year
Alternatives and similar repositories for pypuf
Users that are interested in pypuf are comparing it to the libraries listed below
Sorting:
- Defense/Attack PUF Library (DA PUF Library)☆51Updated 5 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆19Updated 5 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆28Updated 2 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆23Updated last year
- FPGA implementation of a physical unclonable function for authentication☆33Updated 8 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 3 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 7 years ago
- Side-Channel Analysis Library☆98Updated last month
- David Canright's tiny AES S-boxes☆28Updated 11 years ago
- The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM☆100Updated 5 months ago
- Hardware Design of Ascon☆25Updated last month
- Side-channel analysis setup for OpenTitan☆37Updated 2 weeks ago
- ☆51Updated last year
- ☆23Updated 5 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆40Updated 3 weeks ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆63Updated 2 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆37Updated 3 years ago
- ☆59Updated 4 years ago
- ☆21Updated last year
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆61Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆47Updated 5 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Post-Quantum Cryptography IP Core (Crystals-Dilithium)☆35Updated this week
- Side Channels Analysis and Deep Learning☆219Updated 2 years ago
- An Implementation of the Number Theoretic Transform☆48Updated 2 years ago
- Hardware implementation of ORAM☆22Updated 8 years ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆37Updated 5 years ago
- Configurable AES-GCM IP (128, 192, 256 bits)☆38Updated last month
- The MIT Sanctum processor top-level project☆30Updated 5 years ago
- SMT Attack☆21Updated 4 years ago