anishathalye / notary
Notary: A Device for Secure Transaction Approval π
β28Updated 2 months ago
Alternatives and similar repositories for notary:
Users that are interested in notary are comparing it to the libraries listed below
- Tools for reasoning about circuits in Rosette/Racket πβ19Updated 2 months ago
- Iodine: Verifying Constant-Time Execution of Hardwareβ12Updated 4 years ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities πβ33Updated 2 months ago
- β16Updated 3 years ago
- Circuits for functions of interest to cryptographyβ27Updated last year
- A Tool for the Static Analysis of Cache Side Channelsβ40Updated 8 years ago
- β30Updated 3 years ago
- Symbolic execution tool for Sail ISA specificationsβ66Updated last month
- Minimal RISC Extensions for Isolated Executionβ52Updated 5 years ago
- A repository of tools for verifying constant-timenessβ18Updated 2 months ago
- CHERI-RISC-V model written in Sailβ58Updated 2 weeks ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.β21Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitivesβ60Updated 10 months ago
- My MEng thesis code - verifying a security property for an SoC with Rosetteβ17Updated 3 years ago
- Multiplication using AVX512 and AVX512IFMA instructionsβ23Updated 9 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extensionβ27Updated 9 months ago
- β19Updated 10 years ago
- Fine-grained frequency and voltage transition testsβ20Updated last year
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verifiedβ¦β47Updated this week
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.β16Updated 2 weeks ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyβ35Updated 3 years ago
- MAGE: Memory-Aware Garbling Engineβ26Updated 8 months ago
- Tests for verifying compliance of RMM implementationsβ18Updated last month
- Some experiments with SMT solvers and GIMPLE IRβ36Updated last year
- β10Updated last year
- RISC-V BSV Specificationβ20Updated 5 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.β21Updated 2 years ago
- β16Updated 8 months ago
- Circuits and hardware security modules formally verified with Knox πβ23Updated 2 months ago
- Verifying OpenTitanβ25Updated last year