Concyclics / HiAELinks
Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"
☆18Updated 2 months ago
Alternatives and similar repositories for HiAE
Users that are interested in HiAE are comparing it to the libraries listed below
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated last month
- ☆38Updated 4 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated last month
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Updated last year
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Updated last year
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Updated last month
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- ☆13Updated 2 years ago
- Finalists to the NIST lightweight cryptography competition☆38Updated 3 years ago
- AES Galois Extended Mode☆19Updated last year
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE …☆14Updated 6 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Online engine for reasoning about the Noise Protocol Framework.☆19Updated last year
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- ☆19Updated 2 months ago
- An AES-based 384 bit permutation.☆21Updated 9 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆86Updated last month
- ☆25Updated 8 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆19Updated 10 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated last month
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- MAYO C implementation☆21Updated 10 months ago