scaspin / memory-safe-assemblyLinks
Bottom-up memory-safety for assembly language using symbolic execution
☆17Updated last week
Alternatives and similar repositories for memory-safe-assembly
Users that are interested in memory-safe-assembly are comparing it to the libraries listed below
Sorting:
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- ☆23Updated 10 months ago
- Wycheproof for Rust☆20Updated 5 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Updated last year
- Rust library for cryptographic research☆151Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- FN-DSA (Falcon) signature scheme☆49Updated 10 months ago
- The formally verified crypto library for Rust☆201Updated this week
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆29Updated last year
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- Crypto library☆67Updated 2 months ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Verifying constant-time code with symbolic execution☆47Updated 4 years ago
- ☆19Updated 2 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago
- ☆17Updated 5 months ago
- Banquet implementation☆14Updated 3 years ago
- Please see https://github.com/hacspec/hax☆245Updated last year
- A repository of tools for verifying constant-timeness☆19Updated this week
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- MAYO C implementation☆22Updated 10 months ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Frayed ribbon filter cascade☆48Updated 2 years ago
- An implementation of the DudeCT constant-time function tester☆25Updated 2 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated last month
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Updated 2 years ago