XKCP / K12Links
XKCP-extracted code for KangarooTwelve (K12)
☆52Updated 2 months ago
Alternatives and similar repositories for K12
Users that are interested in K12 are comparing it to the libraries listed below
Sorting:
- The BLAKE3 paper: specifications, analysis, and design rationale☆187Updated 3 years ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- SYCL accelerated BLAKE3 Hash Implementation☆17Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated last month
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 5 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆120Updated last week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- Jitterentropy Library☆135Updated last week
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- Leopard-RS : O(N Log N) MDS Reed-Solomon Block Erasure Code for Large Data☆157Updated last year
- Signcryption using libsodium.☆68Updated last month
- CRYPTOGAMS distribution repository☆65Updated 5 months ago
- Implementation of Messaging Layer Security☆133Updated 2 months ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- An AES-based 384 bit permutation.☆21Updated 9 months ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆87Updated last month
- Bertie TLS 1.3 Implementation☆130Updated 4 months ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Updated 5 years ago
- Quick sort code using AVX2 instructions☆69Updated 8 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 8 years ago
- ☆82Updated 5 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Updated 11 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A simpler alternative to the Noise protocol framework.☆23Updated 5 years ago
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆220Updated last month