Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers
☆14Nov 21, 2016Updated 9 years ago
Alternatives and similar repositories for BlockCiphersOnAVR
Users that are interested in BlockCiphersOnAVR are comparing it to the libraries listed below
Sorting:
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆33Jan 17, 2022Updated 4 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆104Updated this week
- ☆18Nov 29, 2018Updated 7 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Fast constant-time AES implementations on 32-bit architectures☆70Oct 17, 2024Updated last year
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- ☆11Mar 19, 2023Updated 3 years ago
- VGP (Very Good Privacy) E2E Encryption Library☆11Jan 29, 2021Updated 5 years ago
- Convert powerpoint (pptx) files into raw text org or LaTeX files☆15Aug 28, 2018Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- MIT 6.875☆14Dec 13, 2025Updated 3 months ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- A programming language to write bitsliced ciphers☆60Sep 4, 2024Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- 2022 alps study repository☆11Feb 3, 2023Updated 3 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated 11 months ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆29Mar 19, 2019Updated 7 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- A new heuristic to optimize implementations of linear matrices☆19Jan 2, 2023Updated 3 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated 2 months ago
- A software cache partitioning tool☆14May 9, 2012Updated 13 years ago