google / open-diceLinks
☆25Updated this week
Alternatives and similar repositories for open-dice
Users that are interested in open-dice are comparing it to the libraries listed below
Sorting:
- CoRIM and CoMID manipulation library☆18Updated this week
- ☆153Updated last week
- Security and Privacy Research at Microsoft☆44Updated last year
- This repo is used for managing conversations about Veraison features☆53Updated last year
- ☆53Updated last month
- Reference implementation of the TCG Trusted Platform Module 2.0 specification.☆373Updated 7 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆43Updated last week
- ☆42Updated 2 months ago
- An on-device confidential computing platform☆125Updated 2 weeks ago
- AMD SEV Tool☆86Updated 2 years ago
- Securing platform software☆18Updated 2 years ago
- go-tdx-guest offers a library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamenta…☆75Updated 2 months ago
- HCTR2 specification and test vectors☆36Updated 8 months ago
- Normal World Client side of the TEE☆214Updated last week
- Meeting materials☆16Updated last week
- ☆42Updated this week
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆62Updated 5 months ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆69Updated last month
- TPM2 Access Broker & Resource Management Daemon implementing the TCG spec.☆122Updated this week
- TCTI module for use with TSS2 libraries in UEFI environment☆36Updated 11 months ago
- Test suite☆85Updated last week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆247Updated 2 weeks ago
- ☆58Updated 7 months ago
- OP-TEE Sample Applications☆194Updated last week
- A Rust driver for the Arm Generic Interrupt Controller version 3 or 4 (GICv3 and GICv4).☆37Updated 2 months ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆292Updated 2 weeks ago
- ☆19Updated last year
- TrustZone True Number Generator☆39Updated 3 years ago
- Formal specification of attestation mechanisms in Confidential Computing☆22Updated last year
- Robust Internet of Things, Microsoft Research☆88Updated 2 years ago