Checking that functions are constant time with Valgrind
☆200Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for ctgrind
Users that are interested in ctgrind are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Mar 20, 2017Updated 9 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated 2 months ago
- dude, is my code constant time?☆204Mar 19, 2024Updated 2 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- ☆16Mar 27, 2018Updated 8 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 5 months ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 9 months ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆62Jan 16, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Tool for the Static Analysis of Cache Side Channels☆43Mar 5, 2017Updated 9 years ago
- Constant-Time Toolkit☆300Aug 29, 2018Updated 7 years ago
- ☆11Mar 19, 2023Updated 3 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 6 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- Perform cache attack using javascript☆22May 20, 2015Updated 10 years ago
- Research code to perform AES timing attacks circa 2006☆15Feb 13, 2014Updated 12 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An implementation of a post quantum anonymous credential scheme☆15Dec 18, 2024Updated last year
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Constant Time Operations for Crypto Libraries☆10Jun 22, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- SSL and TLS protocol test suite and fuzzer☆618Mar 30, 2026Updated last month
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated 2 months ago
- Supersingular Isogeny Diffie-Hellman in Go☆138Oct 25, 2019Updated 6 years ago
- Flexible and Constant Time Programming Language☆204Feb 18, 2022Updated 4 years ago
- Constant time big numbers for Go☆105Feb 26, 2025Updated last year
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- System tuning recommendations for running cryptographic applications☆23Jun 13, 2016Updated 9 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago