pornin / arm-asm-notesLinks
☆25Updated 10 months ago
Alternatives and similar repositories for arm-asm-notes
Users that are interested in arm-asm-notes are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆135Updated this week
- Lean cryptographic library usable for bare-metal environments☆81Updated last week
- Assembly super-optimization via constraint solving☆237Updated this week
- Crypto library☆67Updated 2 months ago
- dude, is my code constant time?☆198Updated last year
- The formally verified crypto library for Rust☆201Updated this week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 7 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Open Cryptanalysis Platform☆13Updated this week
- Language for high-assurance and high-speed cryptography☆328Updated this week
- ☆23Updated 10 months ago
- Please see https://github.com/hacspec/hax☆246Updated last year
- X25519 Implementation for ARM Cortex-M0/M0+☆16Updated 5 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- ☆201Updated 2 weeks ago
- Community Cryptography Test Vectors☆97Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆69Updated 3 years ago
- ☆19Updated 2 months ago
- MLKEM implementation optimized for embedded microcontrollers☆27Updated 2 months ago
- ☆22Updated last year
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆95Updated 3 months ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Updated 10 months ago
- ☆14Updated 9 months ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆42Updated 2 weeks ago
- A Course in Cryptanalysis☆151Updated last year
- Cryptographic protocol analysis for real-world protocols.☆67Updated last month
- A repository of tools for verifying constant-timeness☆19Updated last week
- Checking that functions are constant time with Valgrind☆196Updated 8 years ago