Hardware Design of Ascon
☆41Apr 13, 2026Updated this week
Alternatives and similar repositories for ascon-verilog
Users that are interested in ascon-verilog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- ☆85Nov 18, 2025Updated 5 months ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Nov 27, 2024Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- Tiny Tapeout GDS Online Viewer☆23Mar 16, 2026Updated last month
- Verilog implementation of the 32-bit version of the Blake2 hash function☆22Dec 17, 2025Updated 4 months ago
- All the tools you need to reproduce the CellIFT paper experiments☆24Feb 11, 2025Updated last year
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- NTS proof of concept in Python☆10Jan 1, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Greyhound on IHP SG13G2 0.13 μm BiCMOS process☆89Apr 10, 2026Updated last week
- Masked Hardware AES with HPC☆17Apr 7, 2026Updated last week
- A FPGA implementation of the NTP and NTS protocols☆64May 31, 2023Updated 2 years ago
- ⏱ A CPU Scheduling Machine☆15May 18, 2020Updated 5 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- ☆41Jan 10, 2024Updated 2 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- Remove upvote and comment counts from Hacker News.☆16Jul 15, 2020Updated 5 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Simple 6502 system on a ULX3S FPGA board☆18Feb 26, 2020Updated 6 years ago
- Tiny matrix multiplication ASIC with 4-bit math☆11Apr 19, 2024Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆41Nov 17, 2024Updated last year
- ☆14Jul 12, 2023Updated 2 years ago
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- A new kind of hardware decompressor for Snappy decompression. Much faster than the existing software one.☆24Jun 27, 2023Updated 2 years ago
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 4 months ago
- Side-Channel Analysis Library☆110Apr 10, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- AHB/APB SRAM Inf, VCS&Verdi Sim.☆16Jun 20, 2022Updated 3 years ago
- ☆11Mar 19, 2026Updated last month
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- processor for post-quantum cryptography☆17Apr 17, 2020Updated 6 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago