Roman-Oliynykov / Kalyna-referenceLinks
Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants
☆36Updated 4 years ago
Alternatives and similar repositories for Kalyna-reference
Users that are interested in Kalyna-reference are comparing it to the libraries listed below
Sorting:
- Reference implementation of the Kupyna hash function (DSTU 7564:2014)☆21Updated 10 years ago
- ☆11Updated 10 years ago
- Implementation of Strumok stream cipher☆19Updated 3 years ago
- Jitterentropy Library☆133Updated 2 weeks ago
- A cryptographic library☆88Updated this week
- The CEX Cryptographic library in C++☆64Updated 2 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆138Updated 2 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Updated 10 years ago
- A fast AES-PRF based secure random-number generator☆21Updated 2 years ago
- Implementation of the proposed Russian block cipher standard, Kuznechik ("Grasshopper"). 128-bit block size, 256-bit key.☆61Updated 11 years ago
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆22Updated 6 years ago
- A modified version of Robert G. Brown's "dieharder" tests for random number generators.☆57Updated 5 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆104Updated 8 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- XKCP-extracted code for KangarooTwelve (K12)☆52Updated 2 months ago
- A C++ Implementation of RFC 4880☆121Updated 6 years ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Updated last month
- Optimized block functions for the ChaCha stream cipher☆52Updated 6 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆188Updated 5 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Updated 10 years ago
- Implementation of argon2 (i, d, id) algorithms with CPU dispatching☆82Updated 4 years ago
- Code of Round5☆11Updated 5 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- Improved fork of https://code.google.com/p/smhasher/☆23Updated 4 years ago
- ☆44Updated 6 years ago
- trinary.dart☆16Updated 10 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Updated last month