keystone-enclave / keystone-runtimeLinks
Eyrie enclave runtime kernel
☆36Updated last year
Alternatives and similar repositories for keystone-runtime
Users that are interested in keystone-runtime are comparing it to the libraries listed below
Sorting:
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 2 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆35Updated 4 years ago
- Loadable Module for Keystone Enclave☆19Updated 2 years ago
- Demo host and enclave applications exercising most functionality.☆31Updated last year
- RISC-V Linux for Keystone Enclave (will be deprecated in the future versions. See https://github.com/keystone-enclave/linux-keystone-driv…☆16Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago
- Minimal RISC Extensions for Isolated Execution☆53Updated 5 years ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- AMD SEV Tool☆83Updated last year
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆85Updated last year
- ☆16Updated 3 years ago
- Key Broker Server for SEV(-ES)☆15Updated 9 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- ☆70Updated 2 years ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆104Updated 2 years ago
- XCrypto: a cryptographic ISE for RISC-V☆93Updated 2 years ago
- Administrative utility for SEV-SNP☆32Updated last week
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆27Updated 10 months ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Updated 2 years ago
- Library for Intel SGX☆14Updated last year
- ☆79Updated 2 years ago
- C3-Simulator is a Simics-based functional simulator for the X86 C3 processor, including library and kernel support for pointer and data e…☆19Updated 2 months ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆80Updated 8 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 2 weeks ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆18Updated last month
- XML representation of the x86 instruction set☆28Updated 3 weeks ago
- CRYPTOGAMS distribution repository☆57Updated this week