☆39Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for Xoodoo
Users that are interested in Xoodoo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆11Mar 28, 2019Updated 7 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- The GIFT Block Cipher☆13Nov 11, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆39Aug 6, 2024Updated last year
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 3 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- KeccakTools is a set of C++ classes that can help analyze the Keccak sponge function family, designed by Guido Bertoni, Joan Daemen, Mich…☆190Oct 8, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆34Apr 15, 2026Updated last month
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 22, 2026Updated 3 weeks ago
- ☆14Mar 3, 2021Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆22Aug 24, 2020Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- eXtended Keccak Code Package☆651Dec 19, 2025Updated 5 months ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- A forward-secure append-only persistent authenticated data structure☆16Jul 5, 2016Updated 9 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 4 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Apr 24, 2026Updated 3 weeks ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Pointcheval Sanders signature☆27Mar 16, 2026Updated 2 months ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Feb 20, 2021Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 4 years ago
- A really tiny crypto library.☆167Apr 30, 2026Updated 2 weeks ago