0xADE1A1DE / CryptOptLinks
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
☆65Updated last year
Alternatives and similar repositories for CryptOpt
Users that are interested in CryptOpt are comparing it to the libraries listed below
Sorting:
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- ☆19Updated 2 months ago
- Crypto library☆67Updated 2 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Examples for EasyCrypt Lectures☆27Updated last week
- ☆38Updated 8 years ago
- ☆14Updated 9 months ago
- A programming language to write bitsliced ciphers☆59Updated last year
- MAYO C implementation☆22Updated 10 months ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆62Updated 3 weeks ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Open Cryptanalysis Platform☆11Updated last week
- ☆12Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- A repository of tools for verifying constant-timeness☆19Updated this week
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- ☆54Updated this week
- Bottom-up memory-safety for assembly language using symbolic execution☆17Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Banquet implementation☆14Updated 3 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆123Updated 4 years ago
- ☆14Updated 5 years ago
- Please see https://github.com/hacspec/hax☆245Updated last year
- Models for authenticated key exchange in Tamarin☆12Updated 6 years ago
- Experiments with Universal Composability in EasyCrypt☆43Updated this week