Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"
☆19Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for HiAE
Users that are interested in HiAE are comparing it to the libraries listed below
Sorting:
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Jan 8, 2026Updated last month
- B站爬虫☆15Dec 10, 2023Updated 2 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 weeks ago
- 2020-2021第二学期操作系统实验☆12Jun 15, 2021Updated 4 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆19Mar 26, 2025Updated 11 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Feb 19, 2026Updated last week
- ADAM is an actively developed CSPRNG inspired by ISAAC64☆20Sep 5, 2025Updated 5 months ago
- ☆25May 14, 2025Updated 9 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Libhydrogen implemented in Java.☆19Mar 15, 2021Updated 4 years ago
- Is SIKE broken yet?☆20Feb 15, 2023Updated 3 years ago
- Safe Rust bindings to the Sodium cryptographic library☆20Apr 15, 2023Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Something like Sage, but for the WebAssembly and JavaScript world.☆37Feb 3, 2023Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated last year
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 14 years ago
- homework in SCUT_SE☆12Nov 9, 2021Updated 4 years ago
- ☆12Feb 4, 2025Updated last year
- ☆33Aug 22, 2025Updated 6 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- HAKES: Efficient Data Search with Embedding Vectors at Scale☆45Jan 22, 2026Updated last month
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- A dead simple library to simulate Minecraft biomes in pure Java☆10Jun 15, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last week
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Updated this week
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- How to create a Minecraft server using WireGuard & PiVPN!☆14Feb 24, 2025Updated last year
- ☆13Oct 6, 2020Updated 5 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆143Updated this week