trailofbits / sixtyfourLinks
How fast can we brute force a 64-bit comparison?
☆52Updated 5 years ago
Alternatives and similar repositories for sixtyfour
Users that are interested in sixtyfour are comparing it to the libraries listed below
Sorting:
- Lower Size Bounds for Sorting Networks☆46Updated 4 years ago
- A differential fuzzer for x86 decoders☆251Updated 10 months ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- estimate peak virtual memory use☆18Updated 4 months ago
- Corpus of crypto formats☆12Updated 2 years ago
- Detect patterns of bad behavior in function calls☆26Updated 5 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- ☆78Updated 4 years ago
- poststructural fuzzing☆31Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- llvm opt fuzzer and bounded exhaustive test generator☆40Updated 2 years ago
- A bunch of scripts to scrape symbols from Linux distributions☆19Updated last month
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆142Updated 4 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 5 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆22Updated 2 years ago
- Tool for automated testing and analysis of Intel x86-64 undocumented instructions in user mode and in the kernel☆45Updated 6 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆26Updated 6 years ago
- A Parallelism Profiler with What-If analyses for Intel Threading Building Blocks (TBB) programs☆13Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 4 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Manipulate C-family ASTs with Clang☆66Updated 6 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Compiler/source code fuzzing tool using AFL instrumentation☆124Updated 7 years ago
- Snapshot of the vectorized MMU that lines up with the vectorized MMU blog☆22Updated 5 years ago