Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment
☆13Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for TEE-TLS-delegator
Users that are interested in TEE-TLS-delegator are comparing it to the libraries listed below
Sorting:
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 weeks ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- ☆17Aug 2, 2021Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 5 years ago
- Implementation of the BLS12-381 pairing-friendly elliptic curve group with extra features needed by the Dusk-Network team☆23Feb 2, 2026Updated last month
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆47Updated this week
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated 2 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- DES cracking using brute force algorithm and CUDA☆25Jun 14, 2017Updated 8 years ago
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Feb 2, 2023Updated 3 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- ☆12May 7, 2021Updated 4 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 9 months ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago