Present Crypto Engine in Verilog
☆11Feb 27, 2016Updated 10 years ago
Alternatives and similar repositories for PresentCryptoEngine
Users that are interested in PresentCryptoEngine are comparing it to the libraries listed below
Sorting:
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Nov 27, 2024Updated last year
- An end-to-end chip authentication architecture based on SRAM PUF and public key cryptography.☆17Nov 22, 2019Updated 6 years ago
- ESP32-NOW with Wifi☆23Apr 11, 2025Updated 11 months ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Apr 7, 2017Updated 8 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- TMMA: A Tiled Matrix Multiplication Accelerator for Self-Attention Projections in Transformer Models, optimized for edge deployment on Xi…☆27Mar 24, 2025Updated 11 months ago
- A custom coprocessor and SoC for hardware security experiments in electronics.☆12May 20, 2017Updated 8 years ago
- MAC system with IEEE754 compatibility☆13Nov 22, 2023Updated 2 years ago
- Hardware-backed biometric authentication for Flutter. Create cryptographic signatures using device biometrics with keys stored in Secure …☆15Mar 4, 2026Updated 2 weeks ago
- softfloat and softposit in Python☆15Aug 2, 2019Updated 6 years ago
- Arduino library for interfacing with 23K256 and 23LC1024 SRAM chips from Arduino☆17Nov 29, 2013Updated 12 years ago
- Embedded facial recognition system involving PYNQ board, Webcam, and HDMI output.☆11May 10, 2018Updated 7 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Low Precision Arithmetic Simulation in PyTorch - extension for posit and beyond☆16Dec 9, 2025Updated 3 months ago
- Bose–Chaudhuri–Hocquenghem Codec☆13Feb 18, 2026Updated last month
- ☆11May 10, 2019Updated 6 years ago
- small tool to sed socket contents☆11Jan 18, 2015Updated 11 years ago
- 基于FP16的二维脉动阵列电路设计☆13Feb 23, 2023Updated 3 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Driver for Microchip Technology Inc. 23LC (23LCV) SPI SRAM chips for AVR, SAM3X (Due), and SAM M0+ (SAMD, SAML, SAMC) microcontrollers on…☆14Nov 26, 2019Updated 6 years ago
- Hardware designs for fault detection☆20Apr 13, 2020Updated 5 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆13Apr 1, 2020Updated 5 years ago
- Error Correction Codes - C☆11May 26, 2019Updated 6 years ago
- A small Deep Learning Image recognition tutorial aimed at people just starting out in their Deep Learning Journey☆12Nov 17, 2018Updated 7 years ago
- Scripts to parse "citations page" of Google Scholar☆18Oct 8, 2015Updated 10 years ago
- A collection of Opal Kelly provided design resources☆17Nov 7, 2025Updated 4 months ago
- A Verilog implementation of a hand-written digit recognition Neural Network☆10Nov 16, 2024Updated last year
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- BCQ tutorial for transformers☆17Jul 17, 2023Updated 2 years ago
- ☆10Jun 7, 2022Updated 3 years ago
- TLS Secured connection example between Mosquitto broker (MQTT) and ESP32☆11Apr 12, 2021Updated 4 years ago
- A library for working with the posit number type.☆16Nov 2, 2020Updated 5 years ago
- A true random number generator with ring oscillators structure written in VHDL targeting FPGA's.☆11Sep 22, 2020Updated 5 years ago
- The Python-based OS powering Pythings.☆16Feb 10, 2026Updated last month
- A pure Python and Numpy implementation of an LSTM Network☆14Mar 2, 2017Updated 9 years ago
- Project of Data and System Security course (Master's Degree in Cybersecurity at University of Pisa)☆14Dec 14, 2020Updated 5 years ago
- ☆15Dec 22, 2022Updated 3 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago