crocs-muni / randomness-testing-toolkitLinks
Randomness testing toolkit automates running and evaluating statistical testing batteries
☆17Updated last year
Alternatives and similar repositories for randomness-testing-toolkit
Users that are interested in randomness-testing-toolkit are comparing it to the libraries listed below
Sorting:
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 2 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆67Updated last month
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- ☆12Updated 4 years ago
- Apache milagro (Incubating)☆36Updated last year
- Lattice-Based Post-Quantum Authenticated Key Exchange☆19Updated 8 years ago
- Applet for testing ecc curves☆25Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆26Updated 10 years ago
- High-order countermeasures for AES and DES☆25Updated 10 months ago
- Implementation of Kravatte Encryption Suite☆16Updated 6 years ago
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆59Updated 2 months ago
- Open source Apis to access a Secure Element from a Web application☆18Updated 8 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Updated 11 months ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- ☆52Updated 7 years ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆12Updated 8 months ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Examples from Eric Vétillard's tutorial re-arranged in a Gradle project☆29Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 5 years ago
- Implementation of cryptographic program obfuscation☆42Updated 7 years ago