Introduction
Getting Started
Basics
1.
Bare Metal
2.
Linux Binary
Tooling
3.
Cargo and RISC-V
3.1.
Build
3.2.
Run & Test
3.2.1.
RISC-V 32-bit
3.2.2.
RISC-V 64-bit
3.3.
Fuzz
3.4.
Formally Verify
4.
Important Crates
4.1.
riscv crate
4.2.
riscv-rt crate
4.3.
r0 crate
5.
riscv crate
Atomics (A) Extension
Bit Manipulation (B) Extension
Compressed Instructions (C) Extension
Vector (V) Extension
6.
Overview
7.
Getting Started
8.
Memory Operations
9.
Integer Arithmetic
10.
Floating-Point Arithmetic
11.
Fixed-Point Arithmetic
12.
Masks and Conditionals
13.
Permutations
14.
Tail Policy
15.
Mask Policy
16.
Cookbook
16.1.
Array Element-Wise Addition
Scalar Cryptography (Zk) Extension
17.
Overview
18.
Bit Manipulation Instructions
19.
AES Block Cipher (Zkned)
19.1.
Usage: 32-bit
19.2.
Usage: 64-bit
20.
SHA-2 Hash Function (Zknh)
21.
SM4 Block Cipher (Zksed)
22.
SM3 Hash Function (Zksh)
23.
Entropy Source (Zkr)
24.
Data Independent Execution Latency (Zkt)
Light
Rust
Coal
Navy
Ayu
Riscvonomicon
Data Independent Execution Latency (Zkt)