imdea-software / verifying-constant-timeLinks
☆38Updated 8 years ago
Alternatives and similar repositories for verifying-constant-time
Users that are interested in verifying-constant-time are comparing it to the libraries listed below
Sorting:
- An implementation of the IETF QUIC protocol in F*☆20Updated 6 years ago
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- ☆34Updated 4 months ago
- A programming language to write bitsliced ciphers☆59Updated last year
- This is a Tamarin model of TLS 1.3☆41Updated 2 years ago
- Checking that functions are constant time with Valgrind☆196Updated 8 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- ☆12Updated 4 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Updated 5 years ago
- ☆54Updated last week
- A repository of tools for verifying constant-timeness☆19Updated this week
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 6 years ago
- Tool to automatically search for linear characteristics☆39Updated 10 years ago
- Crypto library☆67Updated 2 months ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Updated 2 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Updated last year
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Differential Address Trace Analysis☆63Updated last year
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- ☆14Updated 9 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆41Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 8 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Updated 9 years ago