☆35Oct 7, 2025Updated 6 months ago
Alternatives and similar repositories for reftls
Users that are interested in reftls are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Experimental implementation of KEMTLS in Rustls☆35Nov 11, 2025Updated 5 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 3 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- ☆17Aug 26, 2025Updated 7 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- ☆14Apr 14, 2025Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 5 months ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- ☆11Feb 25, 2023Updated 3 years ago
- ProVerif-ATP - Combining ProVerif and Automated Theorem Provers for Security Protocol Verification☆30Mar 10, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Compositional Verification of Security Protocols☆34Updated this week
- EasyCrypt: Computer-Aided Cryptographic Proofs☆384Updated this week
- A formalization of properties of a simple imperative, memory-safe language.☆20Sep 27, 2021Updated 4 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- A Tamarin model and analysis of EMV contactless☆15Feb 16, 2021Updated 5 years ago
- Coq formalization accompanying the paper: Micro-Policies: A Framework for Verified, Tag-Based Security Monitors☆20Sep 23, 2019Updated 6 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Guidelines, procedures, and templates used by the IETF Moderators team.☆24Apr 9, 2026Updated last week
- This is a Tamarin model of TLS 1.3☆43Aug 19, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14May 3, 2019Updated 6 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆515Apr 7, 2026Updated last week
- Crypto library☆69Dec 9, 2025Updated 4 months ago
- A foundational framework for modular cryptographic proofs in Coq☆78Apr 4, 2026Updated last week
- ☆13Jan 21, 2026Updated 2 months ago
- Unified Maude model-checking tool☆13Apr 9, 2026Updated last week
- ☆13Dec 20, 2025Updated 3 months ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Verified Compiler for Gallina, Written in Gallina☆161Updated this week
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Problem Sets for MIT 6.822 Formal Reasoning About Programs, Spring 2020☆19May 4, 2020Updated 5 years ago
- Materials and slides for talks I've given in the past☆14Feb 20, 2026Updated last month
- Experiments with Universal Composability in EasyCrypt☆45Apr 9, 2026Updated last week
- An implementation of the DudeCT constant-time function tester☆26Mar 23, 2026Updated 3 weeks ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Nov 22, 2025Updated 4 months ago