Easily create authenticated data structures
☆43Apr 11, 2023Updated 2 years ago
Alternatives and similar repositories for indurative
Users that are interested in indurative are comparing it to the libraries listed below
Sorting:
- CodeQL library and queries for iterator invalidation☆22May 5, 2021Updated 4 years ago
- Verifying encodings into propositional logic in Lean☆14Aug 14, 2023Updated 2 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Sift through Haskell code for analysis purposes☆18Jul 24, 2018Updated 7 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Haskell tool to automatically bump package versions transitively.☆26May 24, 2016Updated 9 years ago
- Automatic Differentiation using Pseudo Lenses. Neat.☆20Feb 7, 2020Updated 6 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- string diagrams for the working programmer☆14Jul 17, 2023Updated 2 years ago
- Haskell space profiling toolset☆14Nov 7, 2018Updated 7 years ago
- A simple big integer library for janet☆21Jul 31, 2024Updated last year
- an applicative functor that seamlessly talks to HTML inputs☆72Jul 8, 2019Updated 6 years ago
- A cookiecutter template for a best-practices Python project☆30Feb 13, 2026Updated 2 weeks ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- Supersingular-isogeny key encapsulation (SIKE) over P434 in 6502/6510 assembly for Commodore 64☆24Feb 28, 2020Updated 6 years ago
- Haskell implementation of a nix binary cache and client.☆13Jan 4, 2018Updated 8 years ago
- ☆13Mar 16, 2023Updated 2 years ago
- Pairing operations over the BLS12-381 elliptic curve in Haskell☆14Feb 18, 2022Updated 4 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- A verified Implementation of a mini prolog☆17Nov 27, 2022Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Dec 20, 2019Updated 6 years ago
- A privacy-preserving TCP proxy☆12Mar 1, 2023Updated 2 years ago
- Sparse MerkleTree implementation in Rust☆19Oct 16, 2019Updated 6 years ago
- A synchronous, vm pooling http server for janet.☆20Aug 2, 2022Updated 3 years ago
- UI experiments for coda☆66Sep 23, 2021Updated 4 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- Type level algebraic "proofs" using lens combinators☆19Jul 26, 2019Updated 6 years ago
- Authenticated Data Structures☆16Jul 5, 2015Updated 10 years ago
- Collaborative work on reversible computing☆25Oct 30, 2021Updated 4 years ago
- An implementation of the Dunfield-Krishnaswami "Sound and Complete" type-system☆84Jan 3, 2018Updated 8 years ago
- Token for accruing protocol revenues☆16May 27, 2022Updated 3 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Unpinned byte arrays in GHC haskell☆22Jan 8, 2019Updated 7 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- probabilistic programming in Haskell☆17Aug 26, 2016Updated 9 years ago
- An implementation of Fibonacci Anyons in Haskell☆22Oct 14, 2019Updated 6 years ago
- Fast ByteString Builder☆21Feb 28, 2025Updated last year