☆38Mar 20, 2017Updated 8 years ago
Alternatives and similar repositories for verifying-constant-time
Users that are interested in verifying-constant-time are comparing it to the libraries listed below
Sorting:
- ☆11Oct 28, 2020Updated 5 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Checking that functions are constant time with Valgrind☆197Feb 26, 2017Updated 9 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated 3 weeks ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- ☆54Feb 13, 2026Updated 2 weeks ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Flexible and Constant Time Programming Language☆204Feb 18, 2022Updated 4 years ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 7 months ago
- dude, is my code constant time?☆199Mar 19, 2024Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆62Feb 20, 2026Updated last week
- Language for high-assurance and high-speed cryptography☆331Updated this week
- BLST-Verification☆23Jan 22, 2026Updated last month
- Constant-Time Toolkit☆300Aug 29, 2018Updated 7 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 weeks ago
- ☆17Aug 2, 2021Updated 4 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆66Jun 26, 2024Updated last year
- Differential Address Trace Analysis☆63Mar 27, 2024Updated last year
- MAYO C implementation☆23Mar 31, 2025Updated 11 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Feb 12, 2026Updated 2 weeks ago
- ☆13Oct 6, 2020Updated 5 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- A foundational framework for modular cryptographic proofs in Coq☆74Feb 22, 2026Updated last week
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 3 months ago
- Simple password db☆23Nov 23, 2018Updated 7 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- ☆14Apr 14, 2025Updated 10 months ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- OCaml parsers for multiple key formats☆15Aug 1, 2024Updated last year
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Verified Assembly Language for Everest☆305Feb 22, 2024Updated 2 years ago