trusted-computing
There are 40 repositories under trusted-computing topic.
gov4git/gov4git
Decentralized governance for Git communities
nsacyber/HIRS
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
hex-five/multizone-sdk
MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multi
salrashid123/tpm2
TPM2 samples with go-tpm and tpm2_tools
skalenetwork/sgxwallet
sgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
9elements/converged-security-suite
Converged Security Suite for Intel & AMD platform security features
nsacyber/paccor
The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. #nsacyber
riscv/riscv-smmtt
This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant security use cases e.g. confidential-computing, trusted platform services, fault isolation and so on.
IBM/ACE-RISCV
Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for RISC-V with focus on a formally verified and auditable security monitor.
cc-api/evidence-api
Unified API to Access TCG Compliant measurement, event log, quote in Confidential Computing Environment.
intel/confidential-cloud-native-primitives
The project has been moved to CC-API organization. For more information:
dineshpinto/awesome-tee-blockchain
A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.
hex-five/multizone-linux
MultiZone® Security Enclave for Linux
hex-five/multizone-api
MultiZone free and open API definition
hex-five/multizone-sdk-arm
MultiZone® Security TEE for Arm® Cortex®-M is the quick and safe way to add security and separation to any Cortex-M based device. MultiZone® software can retrofit existing designs. If you don’t have TrustZone®, or if you require finer granularity than one secure world, you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.
salrashid123/go_tpm_https_embed
TPM based mTLS
Erlang-Enclave-Thesis/sgx-erlang-extension
Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX
jeremyhahn/go-trusted-platform
Platform software for Trusted Computing - TPM 2.0, Certificate Authority, and Web Services required to perform Local and Remote Attestation, provision, deploy, manage, and secure connected devices and networks at scale.
salrashid123/gcp_tpm_sealed_keys
Sealing RSA and Symmetric keys to TPM PCR values on Google Cloud
hex-five/multizone-ada
MultiZone® Security SDK for Ada
WangYangA9/TrustedCompute
可信计算(Trusted Compute)技术调研
Amanda-WangXiao/Trusted-Camera-Based-on-TCM
A Project for National Information Security Competition for College Students
hex-five/multizone-sdk-andes
MultiZone® Security TEE for Andes N22/AE250 is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multiple equally secure worlds. Unlike antiquated hypervisor-like solutions, MultiZone is self-contained, presents an extremely small attack surface, and it is policy driven, meaning that no coding is required – and in fact even allowed. MultiZone works with any 32-bit or 64-bit RISC-V processors with standard Physical Memory Protection unit (PMP) and “U” mode.
salrashid123/golang-jwt-pkcs11
Generate and verify JWT tokens with PKCS-11
salrashid123/aws_hmac
AWS Credentials for Hardware Security Modules and TPM based AWS_SECRET_ACCESS_KEY
salrashid123/gcp-vtpm-ek-ak
Sign, Verify and decode using Google Cloud vTPM Endorsement and Attestation Key and Certificate
BasedDept/borealis
Northern Lights development repository. Pull requests are not yet accepted
Cach30verfl0w/Krypton
A modular and extensible Kotlin library for PKI, Cryptography and Keystores
cooljeanius/trousers-0.3.11.2
forked from Sourceforge to get it working on OSX
salrashid123/azsigner
KMS, TPM and HSM based Azure Certificate Credentials
Franc-Zar/K8s-Pod-Attestation
Kubernetes integration of a Pod Remote Attestation architecture
yawn/ned
Demo for using AWS Nitro Enclaves cryptographic attestations with AWS KMS
Abhinandan-Khurana/Learn-TPM
Explore and master Trusted Platform Module (TPM) technology with this educational repository, featuring comprehensive guides, code samples, and real-world use cases.
ansiwen/pcr0btg
Simple tool to reconstruct the PCR0 value for Boot Guard 1.0
salrashid123/tee_server_proxy
mTLS proxy containers for GCP Confidential Compute
yawn/nitro-attest
Parse and validate Nitro Enclave attestation documents