sutajiokousagi / betrusted-socLinks
betrusted.io main SoC design
☆12Updated 5 years ago
Alternatives and similar repositories for betrusted-soc
Users that are interested in betrusted-soc are comparing it to the libraries listed below
Sorting:
- QARMA block cipher in C☆30Updated 2 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆13Updated 3 months ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- USB armory - boot loader☆37Updated 4 months ago
- ☆16Updated 4 years ago
- An LLVM based mini-C to Verilog High-level Synthesis tool☆37Updated 4 months ago
- Slides from Public Talks☆18Updated 3 years ago
- Custom PSP app framework☆15Updated 4 years ago
- IP submodules, formatted for easier CI integration☆30Updated last year
- coreboot for HiFive1☆12Updated 7 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- Pentium II microcode (dis)assembler and (de)scrambler☆20Updated 4 years ago
- ✔️ Port of RISCOF to check the NEORV32 for RISC-V ISA compatibility.☆34Updated this week
- QEmu backend for avatar²☆21Updated 3 months ago
- Collection of RISC-V exploits☆30Updated 5 years ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 8 years ago
- CHERI ISA Specification☆24Updated last year
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- Donjon hardware tool for circuits security evaluation☆91Updated 2 weeks ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆39Updated 2 weeks ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆19Updated 2 years ago
- Modular, flexible, cross-platform workload profiling and characterization☆13Updated 4 years ago
- ☆17Updated 2 years ago
- Documentation on the Xous operating system☆33Updated 3 weeks ago
- Intel Management Engine JTAG Proof of Concept☆19Updated 5 years ago