☆38Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for Xoodoo
Users that are interested in Xoodoo are comparing it to the libraries listed below
Sorting:
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- The GIFT Block Cipher☆13Nov 11, 2025Updated 4 months ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- KeccakTools is a set of C++ classes that can help analyze the Keccak sponge function family, designed by Guido Bertoni, Joan Daemen, Mich…☆188Oct 8, 2018Updated 7 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated last month
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆32Feb 23, 2026Updated 3 weeks ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- ☆13Mar 3, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- eXtended Keccak Code Package☆638Dec 19, 2025Updated 3 months ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- A forward-secure append-only persistent authenticated data structure☆16Jul 5, 2016Updated 9 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Pointcheval Sanders signature☆27Updated this week
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- A really tiny crypto library.☆165Dec 26, 2025Updated 2 months ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Jan 14, 2026Updated 2 months ago
- ☆84Nov 18, 2025Updated 4 months ago