5GenCrypto / obfuscation
Implementation of cryptographic program obfuscation
☆41Updated 6 years ago
Alternatives and similar repositories for obfuscation:
Users that are interested in obfuscation are comparing it to the libraries listed below
- ☆35Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- ☆19Updated 5 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Source code of the Whitebox Contest Submission Server☆35Updated 5 months ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- ☆12Updated 5 years ago
- Differential Address Trace Analysis☆54Updated 9 months ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆15Updated 8 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Implementation of indistinguishability obfuscation constructions from scientific literature☆46Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆80Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- ☆12Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Using SGX to harden password hashing☆34Updated 9 years ago
- ☆73Updated 6 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- ☆48Updated 7 years ago