anishathalye / notaryLinks
Notary: A Device for Secure Transaction Approval 📟
☆28Updated 4 months ago
Alternatives and similar repositories for notary
Users that are interested in notary are comparing it to the libraries listed below
Sorting:
- Tools for reasoning about circuits in Rosette/Racket 🔌☆19Updated 4 months ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆33Updated 4 months ago
- Iodine: Verifying Constant-Time Execution of Hardware☆13Updated 4 years ago
- ☆16Updated 3 years ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- ☆30Updated 3 years ago
- Tests for verifying compliance of RMM implementations☆18Updated 3 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆18Updated last month
- Minimal RISC Extensions for Isolated Execution☆53Updated 5 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- Verifying OpenTitan☆26Updated last year
- ☆10Updated last year
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- CHERI-RISC-V model written in Sail☆59Updated 2 months ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆21Updated 2 years ago
- MAGE: Memory-Aware Garbling Engine☆26Updated 10 months ago
- rmem public repo☆42Updated 2 weeks ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- A tool for formally verifying constant-time software against hardware 🕰️☆10Updated 4 months ago
- ☆19Updated 10 years ago
- A programming language to write bitsliced ciphers☆56Updated 9 months ago
- QEMU with support for CHERI☆58Updated last month
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆104Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆13Updated 2 years ago
- Symbolic execution tool for Sail ISA specifications☆67Updated 2 weeks ago
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- ☆29Updated 4 years ago