A set of exercises for getting started with the Tamarin prover
☆21Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for tamarin_toy_protocol
Users that are interested in tamarin_toy_protocol are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Teaching materials related to the Tamarin Prover☆71Aug 6, 2024Updated last year
- A 2-4h workshop on the Tamarin protocol verifier.☆22Mar 9, 2026Updated 3 weeks ago
- Tamarin models for state continuity of SGX enclave programs☆14Aug 6, 2021Updated 4 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- This is an experiment platform with autonomous agent openpilot0.8.9 and simulator carla 9.11 without docker setups.☆11Jan 3, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a Tamarin model of TLS 1.3☆43Aug 19, 2023Updated 2 years ago
- ☆19Dec 27, 2024Updated last year
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning☆13Mar 7, 2025Updated last year
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- 2048 webassembly implementation in Rust that can be run on browser or command line terminal☆10Jan 7, 2021Updated 5 years ago
- Web application for course on Formal Reasoning About Programs☆17Sep 17, 2025Updated 6 months ago
- Manuela Demo Apps☆16Mar 28, 2024Updated 2 years ago
- Examples of converting different open-source deep learning models to TAO compatible format through TAO BYOM package.☆12Dec 13, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"☆14May 30, 2017Updated 8 years ago
- DepQBF, a solver for quantified boolean formulae (QBF).☆40Apr 11, 2023Updated 2 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Artefacts for evaluating user-intent-formalization (translating natural language intent to formal specifications) in different languages☆19Mar 18, 2026Updated last week
- ☆37Nov 13, 2025Updated 4 months ago
- ☆14Feb 19, 2025Updated last year
- ☆31Mar 18, 2025Updated last year
- Python winternitz package. Contains (probably) post-quantum secure digital signature algorithms. Currently WOTS and WOTS+ are implemented☆15Mar 14, 2019Updated 7 years ago
- Contains MATLAB and Python codes and plots for deriving inferences for various concepts of Wireless Communications.☆15Jan 5, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- FHE in the Risc0 zkVM☆25Nov 16, 2023Updated 2 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- ☆24Updated this week
- Magisk Module containing the minimal software/framework/firmware for NFC functionality for NXP controllers, future plans for a hook for N…☆10Jun 30, 2023Updated 2 years ago
- plutus_backtest is a python package for backtesting investment decisions using Python 3.6 and above.☆12Aug 1, 2022Updated 3 years ago
- A system for automated discovery of congestion control attacks on TCP implementations☆19Aug 21, 2018Updated 7 years ago
- Symbolic Liveness Analysis of real-world software building upon KLEE to detect liveness violations (e.g. infinite loop bugs)☆12Dec 16, 2021Updated 4 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- Website!☆22Sep 20, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Material (mostly slides) for a graduate course on (formal) software analysis.☆33Jul 15, 2019Updated 6 years ago
- On the TOCTOU Problem in Remote Attestation☆15Jun 4, 2024Updated last year
- @bisq-network fork of the bitcoinj library☆14Dec 23, 2025Updated 3 months ago
- A focused web crawler that uses Machine Learning to fetch better relevant results.☆13Jan 12, 2019Updated 7 years ago
- U-Boot for ARMv5 Marvell Kirkwood platforms☆20Dec 14, 2014Updated 11 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Mar 18, 2025Updated last year