imdea-software / verifying-constant-timeLinks
☆38Updated 8 years ago
Alternatives and similar repositories for verifying-constant-time
Users that are interested in verifying-constant-time are comparing it to the libraries listed below
Sorting:
- A Tool for the Static Analysis of Cache Side Channels☆41Updated 8 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 6 years ago
- ☆33Updated 2 weeks ago
- Checking that functions are constant time with Valgrind☆191Updated 8 years ago
- This is a Tamarin model of TLS 1.3☆40Updated 2 years ago
- A programming language to write bitsliced ciphers☆58Updated last year
- High-order countermeasures for AES and DES☆25Updated last year
- A repository of tools for verifying constant-timeness☆18Updated 8 months ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- ☆53Updated last week
- Code to fuzz bignum libraries☆46Updated 6 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆78Updated 3 months ago
- Differential Address Trace Analysis☆60Updated last year
- Models for authenticated key exchange in Tamarin☆12Updated 6 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 6 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Updated 4 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆98Updated 2 years ago
- DEciding Equivalence Properties in SECurity protocols☆19Updated 2 years ago
- Crypto library☆66Updated 2 weeks ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Spectre attack against SGX enclave☆237Updated 7 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 4 years ago
- ☆12Updated 4 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago