Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for trusted computing
trusted-computing
x
15 search results found
Hirs
⭐
158
Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber
Gov4git
⭐
98
Decentralized governance for Git communities
Multizone Sdk
⭐
74
MultiZone® Security TEE is the quick and safe way to add security and separation to any RISC-V processors. The RISC-V standard ISA doesn't define TrustZone-like primitives to provide hardware separation. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multi
Sgxwallet
⭐
59
sgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
Converged Security Suite
⭐
53
Converged Security Suite for Intel & AMD platform security features
Paccor
⭐
52
The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. #nsacyber
Tpm2
⭐
36
TPM2 samples with go-tpm and tpm2_tools
Confidential Cloud Native Primitives
⭐
21
Build Trusted Chain for Cloud Native in Confidential Computing Envrionment
Cc Trusted Api
⭐
19
Unified API to Access TCG Compliant measurement, event log, quote in Confidential Computing Environment.
Multizone Linux
⭐
16
MultiZone® Security Enclave for Linux
Ace Riscv
⭐
14
Assured Confidential Execution (ACE) for RISC-V
Multizone Sdk Arm
⭐
13
MultiZone® Security TEE for Arm® Cortex®-M is the quick and safe way to add security and separation to any Cortex-M based device. MultiZone® software can retrofit existing designs. If you don’t have TrustZone®, or if you require finer granularity than one secure world, you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.
Multizone Api
⭐
11
MultiZone free and open API definition
Go_tpm_https_embed
⭐
7
TPM based mTLS
Gcp_tpm_sealed_keys
⭐
5
Sealing RSA and Symmetric keys to TPM PCR values on Google Cloud
Related Searches
C Trusted Computing (8)
Security Trusted Computing (7)
Risc V Trusted Computing (6)
Firmware Trusted Computing (6)
Tpm Trusted Computing (5)
Golang Trusted Computing (4)
Intel Trusted Computing (4)
Tpm2 Trusted Computing (3)
Sgx Trusted Computing (3)
1-15 of 15 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.