1. Introduction
  2. Getting Started
  3. Basics
  4. 1. Bare Metal
  5. 2. Linux Binary
  6. Tooling
  7. 3. Cargo and RISC-V
    1. 3.1. Build
    2. 3.2. Run & Test
      1. 3.2.1. RISC-V 32-bit
      2. 3.2.2. RISC-V 64-bit
    3. 3.3. Fuzz
    4. 3.4. Formally Verify
  8. 4. Important Crates
    1. 4.1. riscv crate
    2. 4.2. riscv-rt crate
    3. 4.3. r0 crate
  9. 5. riscv crate
  10. Atomics (A) Extension
  11. Bit Manipulation (B) Extension
  12. Compressed Instructions (C) Extension
  13. Vector (V) Extension
  14. 6. Overview
  15. 7. Getting Started
  16. 8. Memory Operations
  17. 9. Integer Arithmetic
  18. 10. Floating-Point Arithmetic
  19. 11. Fixed-Point Arithmetic
  20. 12. Masks and Conditionals
  21. 13. Permutations
  22. 14. Tail Policy
  23. 15. Mask Policy
  24. 16. Cookbook
    1. 16.1. Array Element-Wise Addition
  25. Scalar Cryptography (Zk) Extension
  26. 17. Overview
  27. 18. Bit Manipulation Instructions
  28. 19. AES Block Cipher (Zkned)
    1. 19.1. Usage: 32-bit
    2. 19.2. Usage: 64-bit
  29. 20. SHA-2 Hash Function (Zknh)
  30. 21. SM4 Block Cipher (Zksed)
  31. 22. SM3 Hash Function (Zksh)
  32. 23. Entropy Source (Zkr)
  33. 24. Data Independent Execution Latency (Zkt)

Riscvonomicon

Building