ANSSI-FR / libdrbg
A portable library implementing NIST SP 800-90A DRBGs
☆13Updated 8 months ago
Alternatives and similar repositories for libdrbg:
Users that are interested in libdrbg are comparing it to the libraries listed below
- ☆11Updated last year
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆36Updated last month
- Lean cryptographic library usable for bare-metal environments☆41Updated this week
- MLKEM implementation optimized for embedded microcontrollers☆17Updated 7 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆18Updated 2 weeks ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆16Updated 2 months ago
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Updated 4 months ago
- ☆32Updated 3 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆52Updated this week
- FN-DSA (Falcon) signature scheme☆39Updated this week
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆27Updated 11 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆14Updated last month
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- A collection of high-performance crypto implementations.☆48Updated last week
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 3 weeks ago
- ☆11Updated 3 weeks ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- MAYO C implementation☆16Updated 3 weeks ago
- ☆18Updated 4 months ago
- ☆20Updated 6 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆55Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 9 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated 9 months ago
- Efficient constant-time implementations of SKINNY-128☆12Updated 3 months ago
- ☆10Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Constant-time choose between two variables in Clang/LLVM☆18Updated 6 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago