5GenCrypto / obfuscation
Implementation of cryptographic program obfuscation
☆41Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for obfuscation
- ☆35Updated 7 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Source code of the Whitebox Contest Submission Server☆35Updated 3 months ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆80Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 9 years ago
- ☆11Updated 2 years ago
- ☆19Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆43Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆81Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 7 years ago
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- Some lightweight cryptography algorithms optimized for x86☆23Updated 2 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Program for finding low gate count implementations of S-boxes.☆36Updated 2 weeks ago
- ☆48Updated 7 years ago
- Resources to break Adoring Poitras from WhibOx contest☆18Updated 4 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆12Updated 5 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- ☆32Updated 2 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆44Updated 9 years ago
- ☆14Updated 4 years ago
- High-order countermeasures for AES and DES☆25Updated 3 months ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆41Updated 3 years ago
- Analysis and generation of substitutions☆22Updated 2 years ago
- Haraka is a secure and efficient short-input hash function.☆51Updated 7 years ago