Ko- / riscvcrypto
Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture
☆31Updated 4 years ago
Alternatives and similar repositories for riscvcrypto:
Users that are interested in riscvcrypto are comparing it to the libraries listed below
- ☆18Updated 4 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆11Updated last month
- ☆11Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- A bitsliced implementation of ECB and CTR AES☆49Updated 8 months ago
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 2 months ago
- ☆15Updated 4 years ago
- MLKEM implementation optimized for embedded microcontrollers☆19Updated 8 months ago
- ☆10Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆26Updated last year
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆54Updated this week
- NEON implementation of NIST lattice-based PQC finalists☆19Updated 3 years ago
- ☆19Updated 5 months ago
- ☆11Updated 3 years ago
- Saber and NTRU on M4 and AVX2☆17Updated 3 years ago
- MAYO C implementation☆16Updated 2 weeks ago
- An Implementation of the Number Theoretic Transform☆44Updated last year
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆11Updated last year
- ☆55Updated 9 months ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆52Updated 2 years ago
- Hardware implementation of Saber☆8Updated 4 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆38Updated 2 months ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆36Updated 4 years ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆29Updated 3 weeks ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- ☆47Updated this week
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆43Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- ☆20Updated 6 months ago
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago