Election-Tech-Initiative / electionguard-c
This repository implements the ElectionGuard API using C. It includes all major functions of the ElectionGuard SDK, including key ceremony, ballot encryption, encrypted ballot tally, and partial decryptions for knowledge proofs of trustees.
☆52Updated 4 years ago
Alternatives and similar repositories for electionguard-c:
Users that are interested in electionguard-c are comparing it to the libraries listed below
- Robust Internet of Things, Microsoft Research☆82Updated last year
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆182Updated this week
- The code to the SGX-ROP paper☆183Updated 4 years ago
- ☆193Updated this week
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆59Updated 2 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- TLS implemented in f7☆43Updated 8 years ago
- Security and Privacy Research at Microsoft☆39Updated 4 months ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- A python module implementing the ElectionGuard specification. This implementation can be used to conduct End-to-End Verifiable Elections …☆164Updated last year
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆62Updated 6 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆60Updated this week
- ☆170Updated 3 years ago
- A network proxy library written in C# for .NET Core based on CANAPE☆181Updated last year
- ☆278Updated last year
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆213Updated 4 years ago
- Secure Device Conneciton Protocol sample and documentation☆47Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- Linux kernel - See Landlock issues☆35Updated last month
- Parse TPM 2.0 Command and Response streams☆26Updated last year
- Sandboxed, Rust-based, Windows Defender Client☆177Updated 7 years ago
- estimate peak virtual memory use☆19Updated last week
- Docs and resources on CPU Speculative Execution bugs☆372Updated 7 years ago
- CRYPTOGAMS distribution repository☆56Updated 2 months ago
- TPM 2.0 Simulator Extraction Script☆48Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Updated 9 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆369Updated 6 months ago
- A binary format analysis tool☆234Updated 3 years ago