pornin / CTTKLinks
Constant-Time Toolkit
☆300Updated 7 years ago
Alternatives and similar repositories for CTTK
Users that are interested in CTTK are comparing it to the libraries listed below
Sorting:
- Noise Specification☆459Updated 7 years ago
- Checking that functions are constant time with Valgrind☆194Updated 8 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated 5 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 5 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- A way to cryptographically hash objects (in the JSON-ish sense) that works cross-language. And, therefore, cross-encoding.☆146Updated 2 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆325Updated 9 years ago
- Missed optimizations in C compilers☆340Updated 7 years ago
- ☆82Updated 5 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- dude, is my code constant time?☆192Updated last year
- ☆58Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- ☆100Updated 9 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- YubiHSM2-backed signing server☆210Updated 7 years ago
- Parser combinators for binary formats, in C. Yes, in C. What? Don't look at me like that.☆440Updated 3 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆399Updated 2 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Demo Spectre with 70 lines code☆126Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Sphinx-based Password Storage low-level library☆129Updated 10 months ago
- ☆89Updated 9 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 5 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- Reference implementations (software)☆85Updated 9 years ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆546Updated 2 years ago
- Reed-Solomon coder computing one million parity blocks at 1 GB/s. O(N*log(N)) algo employing FFT.☆419Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆406Updated 8 years ago