NationalSecurityAgency / XORSATFilter
A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.
☆33Updated 2 years ago
Alternatives and similar repositories for XORSATFilter:
Users that are interested in XORSATFilter are comparing it to the libraries listed below
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆46Updated 6 years ago
- ☆32Updated 9 months ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- SkillTree☆27Updated 2 years ago
- A collection of high-performance crypto implementations.☆47Updated last month
- Simulate realistic trajectory data seen through sporadic reporting☆152Updated last week
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Build Python 3 applications that integrate with Apache Accumulo☆30Updated last year
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12Updated 3 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆60Updated 2 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- ☆9Updated 2 years ago
- Open source binary analysis tools.☆213Updated this week
- ☆11Updated 4 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 4 years ago
- Research unikernel for virtualized services☆48Updated 2 years ago
- IVy is a research tool intended to allow interactive development of protocols and their proofs of correctness and to provide a platform f…☆88Updated 3 months ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Rigorous computation of the endomorphism ring of a Jacobian☆10Updated this week
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated 3 months ago
- ☆21Updated last week
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆46Updated 4 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Code and templates required to build the DARPA open catalog.☆17Updated 8 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago
- Maat is a centralized software integrity measurement and attestation (M&A) service☆26Updated 4 months ago