0xADE1A1DE / CryptOptLinks
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
☆62Updated last year
Alternatives and similar repositories for CryptOpt
Users that are interested in CryptOpt are comparing it to the libraries listed below
Sorting:
- Formal Analysis of the PQXDH Protocol☆28Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated this week
- Circuits for functions of interest to cryptography☆28Updated last year
- ☆17Updated 3 weeks ago
- Crypto library☆66Updated 2 weeks ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last week
- Reference implementations of post-quantum cryptographic primitives☆32Updated 2 months ago
- A repository of tools for verifying constant-timeness☆18Updated 9 months ago
- ☆42Updated 4 months ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆38Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆60Updated last week
- Examples for EasyCrypt Lectures☆26Updated 2 months ago
- Easy SMT solver interaction☆34Updated 3 months ago
- A Tool for the Static Analysis of Cache Side Channels☆41Updated 8 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- A generic library to interact with SMT-LIB 2 compliant solvers running in a separate system process, such as Z3 and CVC4.☆67Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Verifying constant-time code with symbolic execution☆44Updated 4 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- ☆12Updated 4 years ago
- MAYO C implementation☆19Updated 7 months ago
- ☆14Updated 6 months ago
- Open Cryptanalysis Platform☆10Updated last week
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆15Updated last week
- A programming language to write bitsliced ciphers☆58Updated last year
- A tool for formally verifying constant-time software against hardware 🕰️☆13Updated 9 months ago