Inria-Prosecco / reftls
☆30Updated last year
Alternatives and similar repositories for reftls
Users that are interested in reftls are comparing it to the libraries listed below
Sorting:
- ☆35Updated 8 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆51Updated last year
- Crypto library☆58Updated 2 weeks ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Experiments with Universal Composability in EasyCrypt☆33Updated 3 weeks ago
- Tamarin prover manual: source files☆25Updated last month
- This is a Tamarin model of TLS 1.3☆35Updated last year
- Formal Analysis of the PQXDH Protocol☆25Updated 11 months ago
- ☆49Updated this week
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Teaching materials related to the Tamarin Prover☆70Updated 9 months ago
- Examples for EasyCrypt Lectures☆24Updated 3 months ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 11 months ago
- CryptoBib Database for Developers☆44Updated last week
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆61Updated 10 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆31Updated 2 months ago
- ☆15Updated last week
- ☆13Updated 3 weeks ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- A 2-4h workshop on the Tamarin protocol verifier.☆18Updated last month
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆46Updated 4 years ago
- ☆49Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆20Updated this week
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 2 months ago
- MAYO C implementation☆16Updated last month
- Verifying constant-time code with symbolic execution☆43Updated 3 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆104Updated 2 years ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago