Inria-Prosecco / reftlsLinks
☆34Updated 3 months ago
Alternatives and similar repositories for reftls
Users that are interested in reftls are comparing it to the libraries listed below
Sorting:
- ☆38Updated 8 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆54Updated 3 months ago
- ☆54Updated this week
- ☆16Updated last week
- Crypto library☆67Updated last month
- Examples for EasyCrypt Lectures☆26Updated 4 months ago
- Experiments with Universal Composability in EasyCrypt☆42Updated 3 weeks ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- ☆14Updated 9 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- [Obsolete] Tamarin prover manual: source files☆25Updated last month
- This is a Tamarin model of TLS 1.3☆41Updated 2 years ago
- Language for high-assurance and high-speed cryptography☆324Updated last week
- Specifications of cryptographic algorithms in Cryptol☆45Updated 3 weeks ago
- ☆14Updated 5 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 6 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Updated 2 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆67Updated 5 years ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆60Updated 2 months ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 5 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆379Updated this week
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆43Updated 5 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆64Updated last year
- Models for authenticated key exchange in Tamarin☆12Updated 6 years ago
- CryptoBib Main Repository for Developers☆22Updated last year