regehr / const_time
empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs
☆9Updated 9 years ago
Alternatives and similar repositories for const_time:
Users that are interested in const_time are comparing it to the libraries listed below
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- C version of the MetroHash function☆26Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Go bindings for libkeyutils. Store secrets in the Linux keyring.☆9Updated 9 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- Python bindings for libgccjit.so☆48Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Control and diagnostic applications for rump kernels☆36Updated 8 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- TLS in Rust (eventually)☆21Updated 12 years ago
- Fast time calls from user space.☆11Updated 9 years ago
- ☆19Updated 2 years ago
- x86-64 kernel in Rust☆31Updated 8 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆46Updated 4 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Converts an ELF binary to a JSON representation☆35Updated 9 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- A distributed key-value cache with builtin materialized views.☆26Updated 10 years ago
- ipcrypt implementation in C☆32Updated 2 weeks ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 2 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago