0xADE1A1DE / CryptOptLinks
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
☆62Updated last year
Alternatives and similar repositories for CryptOpt
Users that are interested in CryptOpt are comparing it to the libraries listed below
Sorting:
- Crypto library☆62Updated last month
- Formal Analysis of the PQXDH Protocol☆26Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆17Updated 2 weeks ago
- Examples for EasyCrypt Lectures☆24Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated 2 months ago
- Circuits for functions of interest to cryptography☆27Updated last year
- MAYO C implementation☆16Updated 4 months ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 10 months ago
- A repository of tools for verifying constant-timeness☆18Updated 6 months ago
- ☆50Updated 2 weeks ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Open Cryptanalysis Platform☆10Updated last week
- A programming language to write bitsliced ciphers☆57Updated 11 months ago
- Language for high-assurance and high-speed cryptography☆306Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 2 weeks ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆56Updated 3 weeks ago
- ☆35Updated 8 years ago
- Please see https://github.com/hacspec/hax☆244Updated last year
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆61Updated last year
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- Experiments with Universal Composability in EasyCrypt☆38Updated this week
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- ☆15Updated last week
- toy implementation of bfv in rust☆26Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 5 years ago
- ☆28Updated 3 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago