oreparaz / dudectLinks
dude, is my code constant time?
☆190Updated last year
Alternatives and similar repositories for dudect
Users that are interested in dudect are comparing it to the libraries listed below
Sorting:
- Checking that functions are constant time with Valgrind☆192Updated 8 years ago
- A programming language to write bitsliced ciphers☆58Updated last year
- ☆38Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- ☆82Updated 5 years ago
- Crypto library☆66Updated 3 weeks ago
- Flexible and Constant Time Programming Language☆201Updated 3 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- CRYPTOGAMS distribution repository☆62Updated last month
- Verified Assembly Language for Everest☆295Updated last year
- Assembly super-optimization via constraint solving☆223Updated last week
- Language for high-assurance and high-speed cryptography☆313Updated last week
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Lean cryptographic library usable for bare-metal environments☆71Updated last week
- A repository of tools for verifying constant-timeness☆18Updated 8 months ago
- AES-GCM-SIV implementations (128 and 256 bit)☆117Updated 6 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆78Updated 3 months ago
- ☆33Updated 3 weeks ago
- A Tool for the Static Analysis of Cache Side Channels☆41Updated 8 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- A tweakable block cipher☆31Updated last year
- Constant-Time Toolkit☆299Updated 7 years ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- Program for finding low gate count implementations of S-boxes.☆40Updated last year
- Automated generation of provably secure, zero-copy parsers from format specifications☆289Updated 3 weeks ago