crocs-muni / ct-toolsLinks
A repository of tools for verifying constant-timeness
☆18Updated 8 months ago
Alternatives and similar repositories for ct-tools
Users that are interested in ct-tools are comparing it to the libraries listed below
Sorting:
- A Tool for the Static Analysis of Cache Side Channels☆41Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆76Updated 3 months ago
- ☆37Updated 8 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆61Updated last year
- Crypto library☆66Updated this week
- ☆53Updated this week
- Side-channel traces visualizer☆16Updated 5 months ago
- Differential Address Trace Analysis☆58Updated last year
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆18Updated 6 months ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Updated 2 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Program for finding low gate count implementations of S-boxes.☆40Updated 11 months ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Updated last year
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆31Updated 8 months ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆26Updated 5 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆30Updated 2 years ago
- A programming language to write bitsliced ciphers☆58Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆13Updated this week
- MAYO C implementation☆19Updated 6 months ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- High-order countermeasures for AES and DES☆25Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆104Updated this week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆53Updated 3 months ago
- ☆45Updated 6 years ago