MTG-AG / cpt
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for cpt
- a RTE-free X.509 parser☆58Updated 2 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 4 years ago
- This is a Tamarin model of TLS 1.3☆31Updated last year
- X.509 certificate test suite☆41Updated 3 years ago
- Post-quantum cryptography certificates☆52Updated last week
- ☆35Updated 7 years ago
- An implementation of the IETF QUIC protocol in F*☆18Updated 5 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Setup and operation guide for OPTIGA™ TPM backed remote attestation on a Linux system☆19Updated this week
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 6 years ago
- estimate peak virtual memory use☆19Updated 9 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- TLS implemented in f7☆42Updated 8 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆28Updated 8 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated last month
- Dynamic Link Exchange Protocol implementation☆13Updated 3 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆20Updated last year
- ☆28Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 3 years ago
- A history of PGP-related vulnerabilities☆22Updated 3 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 5 years ago