pornin / arm-asm-notesLinks
☆22Updated 4 months ago
Alternatives and similar repositories for arm-asm-notes
Users that are interested in arm-asm-notes are comparing it to the libraries listed below
Sorting:
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆86Updated last week
- Lean cryptographic library usable for bare-metal environments☆60Updated last week
- ☆171Updated 2 weeks ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆46Updated last month
- The formally verified crypto library for Rust☆142Updated this week
- Language for high-assurance and high-speed cryptography☆297Updated last week
- Crypto library☆60Updated 3 weeks ago
- Assembly super-optimization via constraint solving☆206Updated last week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Please see https://github.com/hacspec/hax☆243Updated last year
- ☆13Updated 3 months ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆16Updated 3 months ago
- dude, is my code constant time?☆181Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆23Updated 11 months ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆35Updated 3 months ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆81Updated last month
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated 2 weeks ago
- Raccoon Signature Scheme -- Reference Code☆10Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated 3 weeks ago
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 8 months ago
- ☆20Updated 3 months ago
- Cryptographic protocol analysis for real-world protocols.☆53Updated 10 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- ☆16Updated last month
- Formal Analysis of the PQXDH Protocol☆25Updated last year
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- A list of the state of IETF protocols and PQC☆64Updated 2 weeks ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆38Updated 2 weeks ago
- ☆55Updated last year
- ☆18Updated last year