Cryptanalysis of Physically Unclonable Functions
☆92Jun 29, 2024Updated last year
Alternatives and similar repositories for pypuf
Users that are interested in pypuf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Defense/Attack PUF Library (DA PUF Library)☆54May 5, 2020Updated 5 years ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- Technology-agnostic Physical Unclonable Function (PUF) hardware module for any FPGA.☆139Nov 5, 2022Updated 3 years ago
- The first open source software-based Physically Unclonable Function (PUF) using off-the-shelf SRAM☆105Oct 21, 2025Updated 5 months ago
- Ring Oscillator Physically Unclonable Funtion☆25Sep 9, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆20Oct 30, 2020Updated 5 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- An end-to-end chip authentication architecture based on SRAM PUF and public key cryptography.☆17Nov 22, 2019Updated 6 years ago
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- A Python implementation of fuzzy extractor.☆63Jun 14, 2023Updated 2 years ago
- Synthesiser for Asynchronous Verilog Language☆20Oct 29, 2014Updated 11 years ago
- Repository to store all design and testbench files for Senior Design☆21Apr 16, 2020Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆13Apr 1, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SoC based on SERV, Olof Kindgren's bit-serial RISC-V processor. Provides Execute in Place (XiP) from Flash.☆31Sep 10, 2020Updated 5 years ago
- Yet another anti-bullshit filter list.☆29Mar 18, 2026Updated last week
- Filter for Adblock Plus, uBlock Origin, etc. for scam, phishing, deceptive content, exploit, and tech support scam sites. PLEASE SUBMIT P…☆21Sep 14, 2023Updated 2 years ago
- https://github.com/uavorg/uavstack☆10Sep 11, 2017Updated 8 years ago
- Verilog-A Preisach ferroelectric cap (PFECAP) simulation model for FET☆30Feb 16, 2020Updated 6 years ago
- ✔️ Port of RISCOF to check NEORV32 for RISC-V ISA compatibility.☆39Feb 22, 2026Updated last month
- 基于群签名和群密钥的安全通信系统 Group Communication Security Protocol☆10Jun 1, 2021Updated 4 years ago
- Anatomy of a powerhouse: SystemVerilog TPU based on Google TPU v1☆20Nov 9, 2025Updated 4 months ago
- The instance generator of the Vision and Rescue block ciphers.☆17Mar 4, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Merkle tree·可视化·快速查询·增删·visualization·quick query·add·delete☆12Dec 27, 2021Updated 4 years ago
- ☆15Oct 17, 2017Updated 8 years ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- Parallel SAT solver that won the SAT Competition 2022 by a large margin (24% faster than the 2nd ranked solver)☆25Dec 6, 2022Updated 3 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Lightweight Cryptographic Framework for Internet of Drones☆19Sep 29, 2018Updated 7 years ago
- Command-line interface library for embedded systems☆16Nov 29, 2024Updated last year
- ☆29Aug 9, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hardware implementation of the SipHash short-inout PRF☆17Apr 3, 2025Updated 11 months ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- A Python API for the MiniSat and MiniCard constraint solvers.☆23Jan 1, 2026Updated 2 months ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- ☆13Aug 10, 2014Updated 11 years ago
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- Tendermint implementation of the blockchain of Aleo verifiable computing model built by LambdaClass☆15Feb 8, 2023Updated 3 years ago