redpig / safe-iopLinks
Safe integer operation library for C
☆17Updated 10 years ago
Alternatives and similar repositories for safe-iop
Users that are interested in safe-iop are comparing it to the libraries listed below
Sorting:
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆68Updated 4 years ago
- ELF binary patching utility☆41Updated 9 years ago
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆62Updated 7 years ago
- grep for C/C++ source files.☆28Updated 8 months ago
- privilege separation engine for OpenSSL / LibreSSL☆197Updated last year
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- TLS in Rust (eventually)☆21Updated 12 years ago
- A collection of clang plugins for safer C programming☆91Updated 6 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- Implementations of a fast Message-Authentication Code☆119Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆60Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Integer arithmetic with overflow detection☆71Updated 10 years ago
- CRYPTOGAMS distribution repository☆56Updated 6 months ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Tweaked version of "Aha" - "A Hacker's Assistant" superoptimiser by Henry S. Warren☆58Updated 2 years ago
- ikgt manifest☆42Updated 2 years ago
- malloc leak tracer☆68Updated 2 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 5 years ago
- Example code for the AES crypto instructions on Intel chips☆82Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago