XKCP / K12Links
XKCP-extracted code for KangarooTwelve (K12)
☆49Updated last week
Alternatives and similar repositories for K12
Users that are interested in K12 are comparing it to the libraries listed below
Sorting:
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆92Updated 2 weeks ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆179Updated 2 years ago
- SYCL accelerated BLAKE3 Hash Implementation☆16Updated 3 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆30Updated 2 months ago
- Lean cryptographic library usable for bare-metal environments☆56Updated this week
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 8 months ago
- A collection of high-performance crypto implementations.☆52Updated last month
- Specification for the AEGIS family of authenticated encryption algorithms.☆18Updated last month
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 4 years ago
- This is a pure-rust safe-rust implementation of the Classic McEliece post-quantum scheme☆30Updated 4 months ago
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆213Updated last year
- ☆81Updated 5 years ago
- Bertie TLS 1.3 Implementation☆118Updated 2 weeks ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- Frayed ribbon filter cascade☆47Updated 2 years ago
- Jitterentropy Library☆116Updated this week
- Finalists to the NIST lightweight cryptography competition☆38Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆21Updated this week
- ☆36Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- A memory-hard password hashing function.☆69Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆141Updated 6 months ago
- Reference implementation of the Picnic post-quantum signature scheme☆163Updated 2 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆174Updated last year
- Rust library for cryptographic research☆140Updated 5 months ago
- Optimized Binary GCD for Modular Inversion☆44Updated 4 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆54Updated last year
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- Circuits for functions of interest to cryptography☆27Updated last year