secworks / sha3Links
FIPS 202 compliant SHA-3 core in Verilog
☆20Updated 4 years ago
Alternatives and similar repositories for sha3
Users that are interested in sha3 are comparing it to the libraries listed below
Sorting:
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆31Updated last year
- A Hardware Implemented Poseidon Hasher☆18Updated 3 years ago
- ☆81Updated last year
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Updated 3 years ago
- VexRiscv reference platforms for the pqriscv project☆16Updated last year
- processor for post-quantum cryptography☆16Updated 5 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆54Updated 2 years ago
- ☆13Updated 10 years ago
- Implementation of Number-theoretic transform(NTT) algorithm on FPGA; 快速数论变换(NTT)的FPGA实现,基为2,有两个并行的蝶形单元☆19Updated 2 years ago
- Implementation of cryptographic algorithm with verilog hdl(such as des,aes,sha,rsa,ecc etc.)☆38Updated 5 years ago
- Elgamal's over Elliptic Curves☆19Updated 6 years ago
- Parametric NTT/INTT Hardware Generator☆72Updated 4 years ago
- ☆14Updated last year
- SHA3 (KECCAK)☆19Updated 10 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆34Updated 3 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆22Updated 8 months ago
- Verilog HDL implementation of Elliptic Curve Cryptography (ECC) over GF(2^163)☆21Updated 7 years ago
- Modular SRAM-based indirectly-indexed 2D hierarchical-search Ternary Content Addressable Memory (II-2D-TCAM)☆23Updated 6 months ago
- ☆20Updated 5 years ago
- Hardware implementation of ORAM☆22Updated 7 years ago
- FPGA implementation of a physical unclonable function for authentication☆32Updated 8 years ago
- Artifact associated with CHES 2022 paper https://tches.iacr.org/index.php/TCHES/article/view/9817☆12Updated last year
- This is a Verilog algorithm which takes 8bits and encrypts the data for the purpose of secure communication based on the concept of Ellip…☆31Updated 6 years ago
- ☆35Updated 10 months ago
- Hardware Implementation of Advanced Encryption Standard Algorithm in Verilog☆39Updated 8 years ago
- FPGA implementation of Chinese SM4 encryption algorithm.☆53Updated 7 years ago
- Chisel implementation of AES☆23Updated 5 years ago
- ☆25Updated last year
- Verilog implementation of the SHA-1 cryptgraphic hash function☆52Updated 2 months ago