Inria-Prosecco / reftlsLinks
☆30Updated last year
Alternatives and similar repositories for reftls
Users that are interested in reftls are comparing it to the libraries listed below
Sorting:
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆51Updated last year
- Experiments with Universal Composability in EasyCrypt☆34Updated this week
- Tamarin prover manual: source files☆25Updated last week
- ☆35Updated 8 years ago
- ☆14Updated this week
- Teaching materials related to the Tamarin Prover☆70Updated 9 months ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- Crypto library☆60Updated last week
- This is a Tamarin model of TLS 1.3☆37Updated last year
- ☆13Updated last month
- Examples for EasyCrypt Lectures☆24Updated 3 months ago
- ☆49Updated this week
- Formal Analysis of the PQXDH Protocol☆25Updated 11 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆13Updated 4 years ago
- CertiCrypt Coq Framework☆35Updated 9 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆31Updated this week
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 3 months ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- Specifications of cryptographic algorithms in Cryptol☆41Updated this week
- Super Amazing Universal Composability, Yeah!☆34Updated 3 years ago
- CryptoBib Database for Developers☆44Updated last week
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- DEciding Equivalence Properties in SECurity protocols☆18Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆46Updated 7 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆20Updated 2 weeks ago