Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction
☆28Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for mem-aead
Users that are interested in mem-aead are comparing it to the libraries listed below
Sorting:
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Apr 4, 2018Updated 7 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago
- Working Copy of the NSEC5 Specification☆15Nov 10, 2020Updated 5 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Go implementation of Merkle Tree Certificates☆25Nov 5, 2025Updated 3 months ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Feb 19, 2021Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- [INACTIVE] const-time Rust experiment☆98Nov 2, 2015Updated 10 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 4 months ago