lmrs2 / ct_chooseView external linksLinks
Constant-time choose between two variables in Clang/LLVM
☆20Apr 14, 2018Updated 7 years ago
Alternatives and similar repositories for ct_choose
Users that are interested in ct_choose are comparing it to the libraries listed below
Sorting:
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 6 months ago
- ☆16Feb 27, 2022Updated 3 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- ☆17Feb 21, 2022Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- ☆46Sep 27, 2024Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated this week
- ☆25Dec 9, 2024Updated last year
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 3 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Jun 26, 2024Updated last year
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆31Mar 10, 2025Updated 11 months ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Jan 16, 2017Updated 9 years ago
- ☆23Apr 5, 2025Updated 10 months ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Curve ecGFp5☆69Mar 31, 2022Updated 3 years ago
- Crypto library☆67Dec 9, 2025Updated 2 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- dude, is my code constant time?☆198Mar 19, 2024Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Nov 2, 2020Updated 5 years ago
- Bilinear Pairings Components Library for Delphi☆12Dec 19, 2018Updated 7 years ago
- Experimental implementation of KEMTLS in Rustls☆34Nov 11, 2025Updated 3 months ago
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 13 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Reconnaître la marque/modèle des véhicules dans une image☆11Mar 31, 2023Updated 2 years ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago