[Obsolete] Tamarin prover manual: source files
☆25Mar 10, 2026Updated 2 weeks ago
Alternatives and similar repositories for manual
Users that are interested in manual are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Teaching materials related to the Tamarin Prover☆71Aug 6, 2024Updated last year
- Bose–Chaudhuri–Hocquenghem Codec☆14Mar 19, 2026Updated last week
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆511Mar 10, 2026Updated 2 weeks ago
- A 2-4h workshop on the Tamarin protocol verifier.☆22Mar 9, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Celestia derivation pipeline and proof crate built with kona☆15Dec 19, 2025Updated 3 months ago
- ↔️ tight ghci integration for vim☆17Oct 21, 2022Updated 3 years ago
- Website!☆22Sep 20, 2022Updated 3 years ago
- Implementation of ECDAA☆23Nov 10, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 9 years ago
- 2048 webassembly implementation in Rust that can be run on browser or command line terminal☆10Jan 7, 2021Updated 5 years ago
- An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"☆14May 30, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- Public Key Addressable Resource Records (sovereign TLDs)☆60Feb 26, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆107Feb 20, 2026Updated last month
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- Python winternitz package. Contains (probably) post-quantum secure digital signature algorithms. Currently WOTS and WOTS+ are implemented☆15Mar 14, 2019Updated 7 years ago
- Language snippets for use with `vim-cheat`☆10Jan 1, 2023Updated 3 years ago
- FHE in the Risc0 zkVM☆25Nov 16, 2023Updated 2 years ago
- Distributable shell scripts with dependencies☆11Dec 24, 2016Updated 9 years ago
- A natural-language snippet manager for `vim`☆11Sep 7, 2020Updated 5 years ago
- Implementation of dependent type theory in SWI-Prolog☆10Oct 6, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- low-level DNS library☆20Aug 27, 2024Updated last year
- RFC version of TLS 1.3 -- for collaboration with RFC publication center☆11Jul 5, 2022Updated 3 years ago
- Proof assistant based on first-order logic and set theory☆68Mar 11, 2026Updated 2 weeks ago
- Ruby gem used to load, validate, and parse European Data Format files. Used for batch testing EDFs for errors.☆14Mar 1, 2019Updated 7 years ago
- 6.858 final project.☆18Jan 14, 2016Updated 10 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- A Common Lisp command-line tool for executing shell commands via SSH.☆12Jul 14, 2015Updated 10 years ago
- Gibbs sampling inference to LDA☆19Apr 4, 2014Updated 11 years ago
- On the TOCTOU Problem in Remote Attestation☆15Jun 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 简单的BP神经网络Python实现,自定义神经元层数和数量,单次输入/输出均为一维列表☆10Apr 12, 2018Updated 7 years ago
- A focused web crawler that uses Machine Learning to fetch better relevant results.☆13Jan 12, 2019Updated 7 years ago
- Example of private, public key generation and shared secret derivation using OpenSSL and the x25519 curve.☆12Jun 1, 2017Updated 8 years ago
- ☆27Jun 17, 2024Updated last year
- ☆35Oct 7, 2025Updated 5 months ago
- An implementation of "Freer Monads, More Extensible Effects".☆20Oct 17, 2018Updated 7 years ago
- DNS over QUIC implementation in Go (draft-ietf-dprive-dnsoquic-02)☆18Nov 7, 2021Updated 4 years ago