0xADE1A1DE / CryptOptLinks
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
☆61Updated 11 months ago
Alternatives and similar repositories for CryptOpt
Users that are interested in CryptOpt are comparing it to the libraries listed below
Sorting:
- Crypto library☆60Updated this week
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- MAYO C implementation☆16Updated 2 months ago
- ☆38Updated 9 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated 11 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- ☆49Updated this week
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- Eurydice compiles (a modest subset of) Rust to C. Verify programs in Rust, still get C code for legacy environments.☆38Updated this week
- Examples for EasyCrypt Lectures☆24Updated 3 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 11 months ago
- ☆15Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆20Updated 2 weeks ago
- ☆28Updated 3 years ago
- Clang/LLVM patches to zero stack/registers of sensitive functions☆14Updated 7 years ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆41Updated 5 months ago
- ☆14Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆13Updated last month
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆82Updated 3 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆16Updated 6 months ago
- ☆35Updated 8 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- ☆13Updated 3 years ago