imdea-software / verifying-constant-timeLinks
☆35Updated 8 years ago
Alternatives and similar repositories for verifying-constant-time
Users that are interested in verifying-constant-time are comparing it to the libraries listed below
Sorting:
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆33Updated 7 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆73Updated 3 months ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 5 years ago
- ☆10Updated 4 years ago
- Differential Address Trace Analysis☆57Updated last year
- ☆20Updated 5 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- A repository of tools for verifying constant-timeness☆18Updated 4 months ago
- ☆49Updated last week
- ☆12Updated 3 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated last year
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- ☆30Updated last year
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- A programming language to write bitsliced ciphers☆56Updated 9 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Program analysis tools developed at Draper on the CBAT project.☆103Updated 2 years ago
- High-order countermeasures for AES and DES☆25Updated 10 months ago
- TLS implemented in f7☆43Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Automatic detection of speculative information flows☆68Updated 3 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Updated 3 years ago
- ☆11Updated 4 years ago