fmlab-iis / cryptoline
☆46Updated last week
Alternatives and similar repositories for cryptoline:
Users that are interested in cryptoline are comparing it to the libraries listed below
- Crypto library☆56Updated 2 weeks ago
- ☆35Updated 8 years ago
- Experiments with Universal Composability in EasyCrypt☆33Updated this week
- Examples for EasyCrypt Lectures☆24Updated last month
- ☆30Updated 11 months ago
- ☆19Updated 6 years ago
- ☆14Updated last week
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆38Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- ☆13Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆50Updated 11 months ago
- A programming language to write bitsliced ciphers☆56Updated 6 months ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- A foundational framework for modular cryptographic proofs in Coq☆63Updated 2 months ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 8 years ago
- ☆14Updated last year
- CryptoBib Database for Developers☆44Updated 2 months ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆51Updated this week
- Script generated finite field arithmetic for elliptic curve cryptography☆18Updated last week
- A repository of tools for verifying constant-timeness☆18Updated last month
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated last week
- ☆15Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆60Updated 8 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago