anishathalye / notaryLinks
Notary: A Device for Secure Transaction Approval 📟
☆28Updated 7 months ago
Alternatives and similar repositories for notary
Users that are interested in notary are comparing it to the libraries listed below
Sorting:
- MAGE: Memory-Aware Garbling Engine☆26Updated last year
- ☆30Updated 3 years ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 6 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆27Updated last year
- ☆17Updated 3 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated last year
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆35Updated 7 months ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆19Updated last week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 months ago
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago
- A Tool for the Static Analysis of Cache Side Channels☆41Updated 8 years ago
- CHERI-RISC-V model written in Sail☆64Updated last month
- Eyrie enclave runtime kernel☆37Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆66Updated 10 months ago
- ☆28Updated 3 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆22Updated 3 years ago
- A repository of tools for verifying constant-timeness☆18Updated 6 months ago
- Risc-V hypervisor for TEE development☆121Updated 2 months ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Circuits for functions of interest to cryptography☆28Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 5 years ago
- Crypto library☆62Updated last week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆13Updated last month
- Verification of BPF JIT compilers☆55Updated 2 years ago
- Low level arithmetic primitives in RTL☆23Updated 5 years ago