hacspec / hacspec-pythonLinks
Please check out https://github.com/hacspec/hacspec for more information on hacspec
☆46Updated 4 years ago
Alternatives and similar repositories for hacspec-python
Users that are interested in hacspec-python are comparing it to the libraries listed below
Sorting:
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- Crypto library☆60Updated 3 weeks ago
- ☆14Updated 3 months ago
- Optimized implementation of the Picnic signature scheme☆81Updated 2 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Easily create authenticated data structures☆43Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- ☆35Updated 8 years ago
- ☆82Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆51Updated 2 months ago
- SIDH C reference implementation☆13Updated 8 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- Checking that functions are constant time with Valgrind☆188Updated 8 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- BLST-Verification☆22Updated 6 months ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 11 months ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Schnorr Protocol for Non-interactive Zero-Knowledge Proofs☆76Updated 5 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- The Squirrel Prover repository. An interactive prover for the formal verification of security protocols.☆54Updated 2 months ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- ☆15Updated this week
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆61Updated last year