Checking that functions are constant time with Valgrind
☆198Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for ctgrind
Users that are interested in ctgrind are comparing it to the libraries listed below
Sorting:
- ☆38Mar 20, 2017Updated 9 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated last month
- dude, is my code constant time?☆201Mar 19, 2024Updated 2 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- ☆15Mar 27, 2018Updated 7 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 4 months ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 8 months ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆62Jan 16, 2017Updated 9 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- Constant-Time Toolkit☆300Aug 29, 2018Updated 7 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- ☆11Mar 19, 2023Updated 3 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Perform cache attack using javascript☆22May 20, 2015Updated 10 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Constant Time Operations for Crypto Libraries☆10Jun 22, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- SSL and TLS protocol test suite and fuzzer☆617Updated this week
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated last month
- Supersingular Isogeny Diffie-Hellman in Go☆138Oct 25, 2019Updated 6 years ago
- Constant time big numbers for Go☆106Feb 26, 2025Updated last year
- Flexible and Constant Time Programming Language☆204Feb 18, 2022Updated 4 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- System tuning recommendations for running cryptographic applications☆23Jun 13, 2016Updated 9 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Mar 4, 2026Updated 2 weeks ago