pornin / CTTKView external linksLinks
Constant-Time Toolkit
☆301Aug 29, 2018Updated 7 years ago
Alternatives and similar repositories for CTTK
Users that are interested in CTTK are comparing it to the libraries listed below
Sorting:
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 4 years ago
- ☆82Apr 18, 2020Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Implements ristretto255, a fast prime-order group.☆107Aug 6, 2025Updated 6 months ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 8 years ago
- Flexible and Constant Time Programming Language☆204Feb 18, 2022Updated 3 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Verified Assembly Language for Everest☆304Feb 22, 2024Updated last year
- Curve ecGFp5☆69Mar 31, 2022Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Dec 20, 2019Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Checking that functions are constant time with Valgrind☆196Feb 26, 2017Updated 8 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Jun 1, 2021Updated 4 years ago
- KaRaMeL is a tool for extracting low-level F* programs to readable C code☆493Feb 6, 2026Updated last week
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Jan 16, 2017Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Feb 19, 2021Updated 4 years ago
- ☆170Mar 15, 2021Updated 4 years ago
- Wrangling Untrusted File Formats Safely☆4,703Nov 24, 2025Updated 2 months ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year