anishathalye / notaryLinks
Notary: A Device for Secure Transaction Approval π
β28Updated 9 months ago
Alternatives and similar repositories for notary
Users that are interested in notary are comparing it to the libraries listed below
Sorting:
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities πβ40Updated 9 months ago
- β30Updated 3 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.β19Updated 3 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitivesβ63Updated last year
- MAGE: Memory-Aware Garbling Engineβ26Updated last year
- A repository of tools for verifying constant-timenessβ18Updated 9 months ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is readyβ35Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architectureβ31Updated 5 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.β15Updated 2 years ago
- β17Updated 3 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extensionβ29Updated last year
- Fast constant-time AES implementations on 32-bit architecturesβ67Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curvesβ21Updated 5 years ago
- Crypto libraryβ66Updated this week
- Slides from talks and other materials related to post-quantum cryptoβ12Updated 4 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZoneβ109Updated 3 years ago
- Tools for reasoning about circuits in Rosette/Racket πβ19Updated 9 months ago
- Circuits for functions of interest to cryptographyβ28Updated last year
- Minimal RISC Extensions for Isolated Executionβ53Updated 6 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.β42Updated 6 months ago
- The code base for the I4 prototype, as described in the SOSP '19 paper "I4: Incremental Inference of Inductive Invariants for Verificatioβ¦β26Updated 4 years ago
- Demo host and enclave applications exercising most functionality.β31Updated 2 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communicationsβ15Updated 4 years ago
- A tool for formally verifying constant-time software against hardware π°οΈβ13Updated 9 months ago
- Implementations of do255e and do255s in C and assemblyβ25Updated 4 years ago
- XCrypto: a cryptographic ISE for RISC-Vβ92Updated 2 years ago
- Mix network simulatorβ10Updated 4 years ago
- Circuits and hardware security modules formally verified with Knox πβ26Updated 9 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructureβ14Updated last month
- rmem public repoβ48Updated 6 months ago