supranational / hardware
Low level arithmetic primitives in RTL
☆23Updated 5 years ago
Alternatives and similar repositories for hardware:
Users that are interested in hardware are comparing it to the libraries listed below
- Implementation of an RSA VDF evaluator targeting FPGAs.☆48Updated 5 years ago
- An acceleration engine for proving SNARKS over the bn128 curve, targeted for AWS FPGAs☆53Updated 4 years ago
- Hardcaml_zprize implements high performance, open source cryptographic solutions for large scale number theoretic transforms (NTT) and mu…☆54Updated 10 months ago
- A Hardware Implemented Poseidon Hasher☆18Updated 3 years ago
- XCrypto: a cryptographic ISE for RISC-V☆92Updated 2 years ago
- Zcash FPGA acceleration engine☆123Updated 4 years ago
- The hardware implementation of Poseidon hash function in SpinalHDL☆19Updated 2 years ago
- ☆16Updated last year
- ☆10Updated 5 years ago
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆22Updated 8 months ago
- VexRiscv reference platforms for the pqriscv project☆16Updated last year
- Website!☆22Updated 2 years ago
- Chisel module for performing Multi-Scalar Multiplication☆12Updated 3 years ago
- Research repository for distributed GPU based zkSNARKs prover☆23Updated 6 years ago
- FPGA250 aboard the eFabless Caravel☆29Updated 4 years ago
- PicoRV☆44Updated 5 years ago
- Pairing operations over the BLS12-381 elliptic curve in Haskell☆14Updated 3 years ago
- Hardware implementation of ORAM☆22Updated 7 years ago
- Exploring the Ed25519 (FPGA) design space.☆16Updated 7 years ago
- LunaPnR is a place and router for integrated circuits☆46Updated 5 months ago
- fft impl for ff::Field☆16Updated 11 months ago
- FIPS 202 compliant SHA-3 core in Verilog☆19Updated 4 years ago
- A fault-injection framework using Chisel and FIRRTL☆36Updated 2 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- ☆16Updated 7 months ago
- Block-diagram style digital logic visualizer☆23Updated 9 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Updated 3 weeks ago
- Mutation Cover with Yosys (MCY)☆80Updated 2 weeks ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆14Updated 3 weeks ago
- Using VexRiscv without installing Scala☆38Updated 3 years ago