MTG-AG / cptView external linksLinks
☆12Jul 7, 2022Updated 3 years ago
Alternatives and similar repositories for cpt
Users that are interested in cpt are comparing it to the libraries listed below
Sorting:
- Certificate Fuzzer based on the work by Johannes Roth (cryptosource)☆13Jun 23, 2020Updated 5 years ago
- Bilingual Implementation of TLS1.3 in C++ and Rust☆11Feb 6, 2026Updated last week
- ☆18Jan 26, 2026Updated 2 weeks ago
- A cryptographic framework, proven for correctness in SPARK☆15Dec 16, 2024Updated last year
- SPARK Proof Analysis Tool☆17Oct 19, 2020Updated 5 years ago
- JSON/JWK/JWS/JWT/Base64 library in SPARK☆19Oct 12, 2020Updated 5 years ago
- Formally verified, bounded-stack XML library☆24May 26, 2020Updated 5 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated this week
- ☆19Jan 14, 2026Updated last month
- A cryptographic library in SPARK 2014☆28Jan 26, 2021Updated 5 years ago
- Tooling for analysis and manipulation of Ada software☆35Oct 18, 2024Updated last year
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Adapt the SimSpark simulator for SPL rules☆11Jul 9, 2023Updated 2 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- Example of using Protractor with Cucumber and Page Objects☆10Apr 12, 2017Updated 8 years ago
- Ada-bindings for 0mq☆42Nov 17, 2025Updated 2 months ago
- A guide on how to emulate an NVMe SPDM responder device with QEMU and Linux. Additionally, instructions on setting up and testing the (in…☆11Sep 3, 2024Updated last year
- Alistair's fork of the Linux kernel source tree. Including sources for the mainline reMarkable 2 kernel development, sunxi patches and ot…☆11Feb 5, 2026Updated last week
- A tool for secret-shared passphrases.☆14Jan 17, 2022Updated 4 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Oct 26, 2014Updated 11 years ago
- SHA-3 and other Keccak related algorithms in SPARK/Ada.☆36Oct 19, 2023Updated 2 years ago
- RackHD Web UI☆11Jan 22, 2020Updated 6 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 weeks ago
- Utility to benchmark speed of operations of a PKCS#11 implementation.☆13Dec 15, 2025Updated last month
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- ☆10Oct 12, 2024Updated last year
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Ada-tailored UML Modeling Language☆11May 14, 2023Updated 2 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Markdown parser☆11Nov 28, 2025Updated 2 months ago
- This is the repository for the resources in CoNLL 2020 Paper "What Are You Trying Todo? Semantic Typing of Event Processes"☆11Jan 5, 2021Updated 5 years ago
- A Java-based framework for combinatorial test input generation, fault characterization and automated test execution.☆11Jan 22, 2024Updated 2 years ago
- 2023 Momenti Study - Structure and Interpretation of Computer Programs: Rust Edition☆10Jan 4, 2023Updated 3 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Kitbag is a content-addressed versioned tree-structured graph-based datastore.☆14Aug 6, 2021Updated 4 years ago
- Global configuration for Software Factory Zuul instance☆11Updated this week
- GNAT Components Collection – Bindings to C libraries☆16Jan 19, 2026Updated 3 weeks ago