jasmin-lang / jasminLinks
Language for high-assurance and high-speed cryptography
☆322Updated this week
Alternatives and similar repositories for jasmin
Users that are interested in jasmin are comparing it to the libraries listed below
Sorting:
- EasyCrypt: Computer-Aided Cryptographic Proofs☆377Updated this week
- Crypto library☆66Updated 2 weeks ago
- ☆194Updated this week
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆60Updated last month
- ☆54Updated last week
- A foundational framework for modular cryptographic proofs in Coq☆71Updated last week
- Experiments with Universal Composability in EasyCrypt☆42Updated this week
- Automated generation of provably secure, zero-copy parsers from format specifications☆296Updated this week
- ☆16Updated this week
- Please see https://github.com/hacspec/hax☆245Updated last year
- Verified Assembly Language for Everest☆298Updated last year
- Compositional Verification of Security Protocols☆29Updated this week
- A Rust verification tool☆347Updated this week
- Specifications of cryptographic algorithms in Cryptol☆44Updated this week
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆53Updated 2 months ago
- The Squirrel Prover repository. An interactive prover for the formal verification of security protocols.☆58Updated 2 months ago
- Cryptographic protocol analysis for real-world protocols.☆64Updated last week
- The formally verified crypto library for Rust☆188Updated this week
- Flexible and Constant Time Programming Language☆203Updated 3 years ago
- Examples for EasyCrypt Lectures☆26Updated 3 months ago
- IVy is a research tool intended to allow interactive development of protocols and their proofs of correctness and to provide a platform f…☆101Updated 3 weeks ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- The Cryspen HACL Distribution☆20Updated 8 months ago
- ☆33Updated 2 months ago
- A work-in-progress language and compiler for verified low-level programming☆321Updated last week
- RISC-V Specification in Coq☆116Updated 2 months ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- MAYO C implementation☆21Updated 8 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Cryptographic Primitive Code Generation by Fiat☆786Updated this week