crocs-muni / ct-toolsLinks
A repository of tools for verifying constant-timeness
☆19Updated last week
Alternatives and similar repositories for ct-tools
Users that are interested in ct-tools are comparing it to the libraries listed below
Sorting:
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- ☆38Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Updated 2 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Updated last year
- Crypto library☆67Updated 2 months ago
- Program for finding low gate count implementations of S-boxes.☆41Updated last year
- Differential Address Trace Analysis☆63Updated last year
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Updated last month
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated 3 months ago
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- Side-channel traces visualizer☆16Updated 9 months ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆16Updated 6 years ago
- ☆48Updated 7 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆44Updated last year
- Building Distributed Enclave Applications with Sancus and SGX☆16Updated 5 years ago
- ☆54Updated this week
- A programming language to write bitsliced ciphers☆59Updated last year
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Updated 4 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Updated 2 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆31Updated 7 months ago
- ☆28Updated 4 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Updated 4 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- MAYO C implementation☆22Updated 10 months ago