cascremers / scyther
The Scyther Tool for the symbolic analysis of security protocols
☆101Updated 3 months ago
Alternatives and similar repositories for scyther:
Users that are interested in scyther are comparing it to the libraries listed below
- Teaching materials related to the Tamarin Prover☆69Updated 7 months ago
- Main source code repository of the Tamarin prover for security protocol verification.☆452Updated this week
- ☆30Updated 11 months ago
- This is a Tamarin model of TLS 1.3☆35Updated last year
- Tamarin prover manual: source files☆25Updated this week
- A set of exercises for getting started with the Tamarin prover☆19Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆93Updated last year
- EasyCrypt: Computer-Aided Cryptographic Proofs☆343Updated this week
- XPIR: Private Information Retrieval for Everyone☆117Updated 3 years ago
- Differential Address Trace Analysis☆55Updated last year
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- ☆35Updated 8 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 7 months ago
- Experiments with Universal Composability in EasyCrypt☆33Updated this week
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- ACM consolidated LaTeX styles☆66Updated 5 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- Language for high-assurance and high-speed cryptography☆288Updated this week
- CryptoBib Database for Developers☆44Updated 2 months ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆45Updated 7 years ago
- Examples for EasyCrypt Lectures☆24Updated last month
- A tool that can be used to learn state machines from implementations.☆64Updated 3 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated last week
- Crypto library☆57Updated 3 weeks ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- An open source project for study S-boxes☆40Updated 2 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆29Updated 4 months ago