☆38Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for Xoodoo
Users that are interested in Xoodoo are comparing it to the libraries listed below
Sorting:
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆31Updated this week
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- ☆21Dec 16, 2022Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 2 weeks ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- ☆14Apr 14, 2025Updated 10 months ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 3 months ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- ☆13Mar 3, 2021Updated 4 years ago
- The GIFT Block Cipher☆13Nov 11, 2025Updated 3 months ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago