imdea-software / verifying-constant-time
☆35Updated 8 years ago
Alternatives and similar repositories for verifying-constant-time
Users that are interested in verifying-constant-time are comparing it to the libraries listed below
Sorting:
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- A Tool for the Static Analysis of Cache Side Channels☆40Updated 8 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆49Updated last week
- Code to fuzz bignum libraries☆45Updated 6 years ago
- ☆30Updated last year
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Minimal RISC Extensions for Isolated Execution☆52Updated 5 years ago
- A programming language to write bitsliced ciphers☆56Updated 8 months ago
- ☆20Updated 5 years ago
- Measure branching along code paths☆20Updated 8 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆31Updated 7 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated last year
- Implementation of differential fuzz testing for TLS handshake messages☆11Updated 3 years ago
- This is a Tamarin model of TLS 1.3☆35Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆33Updated 3 months ago
- Experimental setup of "Intel MPX explained"☆27Updated 5 years ago
- Crypto library☆59Updated 2 weeks ago
- Differential Address Trace Analysis☆56Updated last year
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- ☆13Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Accompanying material for C-FLAT: Control Flow Attestation for Embedded Systems Software☆42Updated 8 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆51Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago