scaspin / memory-safe-assemblyLinks
Bottom-up memory-safety for assembly language using symbolic execution
☆16Updated this week
Alternatives and similar repositories for memory-safe-assembly
Users that are interested in memory-safe-assembly are comparing it to the libraries listed below
Sorting:
- ☆20Updated 3 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 2 weeks ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Formal Analysis of the PQXDH Protocol☆25Updated last year
- MAYO C implementation☆16Updated 3 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆16Updated 2 weeks ago
- ☆16Updated last month
- FN-DSA (Falcon) signature scheme☆43Updated 3 months ago
- Crypto library☆60Updated 3 weeks ago
- Proof-of-possession for KEM certificates using verifiable generation☆9Updated 3 years ago
- The formally verified crypto library for Rust☆142Updated this week
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated 3 weeks ago
- An implementation of the DudeCT constant-time function tester☆21Updated last year
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 11 months ago
- ☆13Updated 3 months ago
- Rust library for cryptographic research☆140Updated 6 months ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Wycheproof for Rust☆19Updated 10 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆33Updated last month
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- Curve ecGFp5☆68Updated 3 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆16Updated 3 months ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆118Updated 4 years ago
- Clang/LLVM patches to zero stack/registers of sensitive functions☆14Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- A BibTeX collection on Isogeny-based Cryptography☆17Updated 2 years ago