pornin / CTTK
Constant-Time Toolkit
☆296Updated 6 years ago
Alternatives and similar repositories for CTTK
Users that are interested in CTTK are comparing it to the libraries listed below
Sorting:
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated last year
- Checking that functions are constant time with Valgrind☆181Updated 8 years ago
- Noise Specification☆454Updated 6 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆391Updated last year
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Flexible and Constant Time Programming Language☆200Updated 3 years ago
- Sphinx-based Password Storage low-level library☆130Updated 3 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Demo Spectre with 70 lines code☆125Updated 7 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 8 years ago
- YubiHSM2-backed signing server☆209Updated 6 years ago
- dude, is my code constant time?☆177Updated last year
- ☆89Updated 9 years ago
- Missed optimizations in C compilers☆341Updated 7 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆215Updated 5 years ago
- ☆81Updated 5 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- an embeddable dumb heartbeat daemon in 260 bytes of RAM and ≈350 bytes of code☆271Updated 7 years ago
- ☆183Updated 5 years ago
- DISCoHAsH - Simple, fast, quality hash in 120 lines. 10GB/s serial (depending on hardware). Also in NodeJS☆217Updated last year
- Enable piping of internal command output to external commands☆71Updated 6 years ago
- Combining Unit Tests, Fuzzing, and AI☆302Updated 6 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆321Updated 5 years ago
- ☆97Updated 8 years ago
- Presentation: Debugging across pipes and sockets with strace☆151Updated 6 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆67Updated 3 years ago
- The engine that powers DeLorean!☆834Updated 5 years ago