Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction
☆28Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for mem-aead
Users that are interested in mem-aead are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- ☆17Sep 4, 2014Updated 11 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- [INACTIVE] const-time Rust experiment☆98Nov 2, 2015Updated 10 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 13 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Working Copy of the NSEC5 Specification☆15Nov 10, 2020Updated 5 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Apr 4, 2019Updated 6 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 5 months ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Feb 19, 2021Updated 5 years ago
- ☆38Mar 20, 2017Updated 9 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- Tool and library for generating X.509 certificates and certificate requests (mirror)☆16Updated this week
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago