pornin / arm-asm-notesLinks
☆23Updated 7 months ago
Alternatives and similar repositories for arm-asm-notes
Users that are interested in arm-asm-notes are comparing it to the libraries listed below
Sorting:
- Lean cryptographic library usable for bare-metal environments☆71Updated last week
- Assembly super-optimization via constraint solving☆223Updated this week
- dude, is my code constant time?☆190Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆112Updated last week
- Crypto library☆66Updated last week
- Language for high-assurance and high-speed cryptography☆313Updated this week
- The formally verified crypto library for Rust☆177Updated this week
- ☆14Updated 6 months ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- ☆186Updated this week
- Open Cryptanalysis Platform☆10Updated this week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆56Updated 4 months ago
- X25519 Implementation for ARM Cortex-M0/M0+☆16Updated 5 years ago
- Please see https://github.com/hacspec/hax☆244Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆26Updated last year
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆39Updated 7 months ago
- Community Cryptography Test Vectors☆85Updated 6 months ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆89Updated 3 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆19Updated 7 months ago
- Checking that functions are constant time with Valgrind☆192Updated 8 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated this week
- A repository of tools for verifying constant-timeness☆18Updated 8 months ago
- Cryptographic protocol analysis for real-world protocols.☆61Updated last year
- Bottom-up memory-safety for assembly language using symbolic execution☆15Updated last month
- Ascon - Lightweight Authenticated Encryption & Hashing☆248Updated 2 months ago
- ☆57Updated last year
- ☆21Updated 6 months ago
- Run integrity protected workloads in a hardware based Trusted Execution Environment.☆41Updated 2 months ago