imdea-software / verifying-constant-time
☆35Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for verifying-constant-time
- ☆42Updated last week
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 3 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- An implementation of the IETF QUIC protocol in F*☆18Updated 5 years ago
- A repository of tools for verifying constant-timeness☆12Updated 2 months ago
- Minimal RISC Extensions for Isolated Execution☆50Updated 5 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- Differential Address Trace Analysis☆54Updated 7 months ago
- ☆19Updated 4 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Updated 5 years ago
- A programming language to write bitsliced ciphers☆56Updated 2 months ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- Tool to automatically search for linear characteristics☆39Updated 8 years ago
- ☆29Updated 7 months ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆16Updated last year
- ☆13Updated 3 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Updated 7 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆68Updated 5 months ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆48Updated 7 months ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- Crypto library☆52Updated last month