Framework for building transparent memory encryption and authentication solutions
☆27Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for memsec
Users that are interested in memsec are comparing it to the libraries listed below
Sorting:
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- The official repository for EEMBC's SecureMark™-TLS cryptography benchmark.☆19Feb 4, 2023Updated 3 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- FIPS-204 (ML-DSA) implementation in Go☆18Feb 13, 2026Updated 2 weeks ago
- TEE stack for Seismic☆17Updated this week
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- A VHDL implementation of SipHash☆13Feb 19, 2015Updated 11 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated last month
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Anonymous Credit Tokens implementation in Rust☆24Feb 22, 2026Updated last week
- ☆30Feb 9, 2026Updated 3 weeks ago
- Ambient Authority☆21Jun 30, 2023Updated 2 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- MacTok is a research prototype for a one-time anonymous token scheme based on algebraic MACs.☆23Jan 20, 2023Updated 3 years ago
- ☆28Aug 25, 2021Updated 4 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- WebAssembly wrapper for Biscuit authorization tokens☆29Sep 26, 2025Updated 5 months ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- Template repository for a CG proposal or work item.☆17Aug 30, 2024Updated last year
- Specifications for Privacy Proxy Implementations☆32Updated this week
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Jul 8, 2021Updated 4 years ago
- Oblivious HTTP implementation☆32Feb 5, 2026Updated 3 weeks ago
- ☆26Nov 16, 2023Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A compressed bitmap format optimized for small, sparse sets of u32s with zero-copy querying.☆47Feb 16, 2026Updated 2 weeks ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Aug 7, 2019Updated 6 years ago