verified-HRoT / dice-starLinks
☆18Updated last year
Alternatives and similar repositories for dice-star
Users that are interested in dice-star are comparing it to the libraries listed below
Sorting:
- Minimal RISC Extensions for Isolated Execution☆53Updated 6 years ago
- Lean cryptographic library usable for bare-metal environments☆62Updated last week
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- A repository of tools for verifying constant-timeness☆18Updated 5 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆35Updated this week
- CoRIM and CoMID manipulation library and CLI☆12Updated last week
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆87Updated this week
- This repo is used for managing conversations about Veraison features☆52Updated last year
- This repo holds the work area and revisions of the non-ISA specification created by the RISC-V AP-TEE TG. This specification defines the …☆57Updated 2 months ago
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆104Updated 2 years ago
- Crypto library☆60Updated 3 weeks ago
- dude, is my code constant time?☆181Updated last year
- ☆35Updated 8 years ago
- seL4 Device Driver Framework☆22Updated last year
- MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn'…☆85Updated last year
- ☆32Updated last year
- ☆29Updated 4 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- Language for high-assurance and high-speed cryptography☆297Updated this week
- Verified Assembly Language for Everest☆292Updated last year
- A microarchitectural leakage detection framework using dynamic instrumentation.☆74Updated 2 weeks ago
- The SP800-90B_EntropyAssessment C++package implements the min-entropy assessment methods included in Special Publication 800-90B.☆220Updated last month
- An on-device confidential computing platform☆117Updated this week
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated last year
- Please see https://github.com/hacspec/hax☆243Updated last year
- Circuits and hardware security modules formally verified with Knox 🔐☆25Updated 5 months ago
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- On the TOCTOU Problem in Remote Attestation☆14Updated last year
- Spectre attack against SGX enclave☆236Updated 7 years ago