XKCP / K12Links
XKCP-extracted code for KangarooTwelve (K12)
☆48Updated last month
Alternatives and similar repositories for K12
Users that are interested in K12 are comparing it to the libraries listed below
Sorting:
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆32Updated 2 weeks ago
- A collection of high-performance crypto implementations.☆52Updated 5 months ago
- SYCL accelerated BLAKE3 Hash Implementation☆16Updated 3 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆101Updated last month
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 4 years ago
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆217Updated last year
- Jitterentropy Library☆124Updated last month
- CRYPTOGAMS distribution repository☆61Updated last month
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆179Updated 5 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆66Updated 11 months ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Updated 10 years ago
- Leopard-RS : O(N Log N) MDS Reed-Solomon Block Erasure Code for Large Data☆152Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- A CPace PAKE implementation using libsodium.☆37Updated 4 years ago
- Methods and Benchmarks for Random Numbers in a Range☆37Updated 7 years ago
- ☆82Updated 5 years ago
- Random Number Generator based on hardware-accelerated AES instructions☆60Updated 6 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆149Updated last week
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆102Updated 8 years ago
- Community Cryptography Test Vectors☆84Updated 5 months ago
- Testing common random-number generators (RNG)☆189Updated 2 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 9 months ago
- Quick sort code using AVX2 instructions☆69Updated 8 years ago
- Base64 coding and decoding with SIMD instructions (SSE/AVX2/AVX512F/AVX512BW/AVX512VBMI/ARM Neon)☆169Updated 7 months ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆105Updated 4 years ago
- Implementation of Messaging Layer Security☆128Updated 3 months ago