pornin / CTTKLinks
Constant-Time Toolkit
☆296Updated 6 years ago
Alternatives and similar repositories for CTTK
Users that are interested in CTTK are comparing it to the libraries listed below
Sorting:
- Checking that functions are constant time with Valgrind☆184Updated 8 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated last year
- Noise Specification☆455Updated 6 years ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆540Updated 2 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 8 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 5 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆394Updated last year
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- YubiHSM2-backed signing server☆209Updated 6 years ago
- Missed optimizations in C compilers☆341Updated 7 years ago
- ☆198Updated this week
- The Swiss army knife of data examination and manipulation☆333Updated 6 years ago
- Demo Spectre with 70 lines code☆125Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Sphinx-based Password Storage low-level library☆130Updated 4 months ago
- ☆97Updated 8 years ago
- Presentation: Debugging across pipes and sockets with strace☆151Updated 6 years ago
- A "living" Linux process with no memory☆344Updated 4 years ago
- Code for paper "Base64 encoding and decoding at almost the speed of a memory copy"☆204Updated 5 years ago
- ☆89Updated 9 years ago
- an embeddable dumb heartbeat daemon in 260 bytes of RAM and ≈350 bytes of code☆270Updated 7 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- dude, is my code constant time?☆178Updated last year
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆267Updated 3 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆475Updated 5 years ago
- Intuitive Advanced Cryptography☆438Updated 2 years ago
- ☆81Updated 5 years ago
- ☆184Updated 5 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 6 years ago