lnishan / massif-cherrypick
🍒 A massif (Valgrind) extension to analyze partial memory consumptions
☆22Updated 8 years ago
Alternatives and similar repositories for massif-cherrypick:
Users that are interested in massif-cherrypick are comparing it to the libraries listed below
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- ☆13Updated 3 years ago
- A programming language to write bitsliced ciphers☆56Updated 6 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Updated 8 years ago
- Restoration of The Linux Scheduler Simulator (LinSched)☆17Updated 3 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Implementation of Shamir's secret sharing in C++11☆9Updated 10 years ago
- ☆32Updated 3 years ago
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆51Updated 11 months ago
- estimate peak virtual memory use☆19Updated last month
- C++ STL for speed and cryptanalytic application☆10Updated this week
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆86Updated 3 years ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- A live preview for TikZ drawings☆21Updated 2 years ago
- Analysis and generation of substitutions☆23Updated 2 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- An implementation of classical tic-tac-toe game for terminal I/O☆15Updated 2 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆12Updated 4 years ago
- ☆35Updated 8 years ago
- Minimal implementation of the OpenMP runtime library.☆11Updated 3 years ago
- ☆31Updated 3 years ago
- Tool for findings bugs in epoll-based Linux servers☆29Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago