trailofbits / sixtyfour
How fast can we brute force a 64-bit comparison?
☆52Updated 5 years ago
Alternatives and similar repositories for sixtyfour:
Users that are interested in sixtyfour are comparing it to the libraries listed below
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 4 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Lower Size Bounds for Sorting Networks☆44Updated 4 years ago
- poststructural fuzzing☆31Updated 5 years ago
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- ☆19Updated 4 years ago
- estimate peak virtual memory use☆18Updated last week
- System tracer implementation in Rust☆32Updated 8 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆69Updated 8 years ago
- A tweakable block cipher☆31Updated 10 months ago
- Docs and resources on CPU Speculative Execution bugs☆373Updated 7 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- Yet another crippled decompiler project☆104Updated 3 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 7 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆117Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆21Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated last year
- Apparently this maybe blogs or something?☆16Updated 8 months ago
- Manipulate C-family ASTs with Clang☆64Updated 6 years ago