NationalSecurityAgency / XORSATFilter
A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.
☆32Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for XORSATFilter
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- SkillTree☆25Updated 2 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆45Updated 6 years ago
- ☆30Updated 6 months ago
- Simulate realistic trajectory data seen through sporadic reporting☆146Updated 6 months ago
- ☆91Updated 6 months ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 6 years ago
- ☆11Updated 4 years ago
- IVy is a research tool intended to allow interactive development of protocols and their proofs of correctness and to provide a platform f…☆83Updated last week
- Lower Size Bounds for Sorting Networks☆43Updated 3 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆28Updated 8 years ago
- A collection of high-performance crypto implementations.☆44Updated 4 months ago
- Circuits for functions of interest to cryptography☆27Updated 9 months ago
- Open source binary analysis tools.☆208Updated last week
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 5 months ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆13Updated 2 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆68Updated 8 years ago
- A small DFA for under 16 states☆52Updated 6 years ago
- Distributed P2P Data-driven Workflow Framework☆247Updated this week
- ☆22Updated 2 years ago
- TLS implemented in f7☆42Updated 8 years ago
- A tweakable block cipher☆30Updated 6 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- ☆9Updated last year
- Automated generation of provably secure, zero-copy parsers from format specifications☆251Updated this week