Fast constant-time AES implementations on 32-bit architectures
☆70Oct 17, 2024Updated last year
Alternatives and similar repositories for aes
Users that are interested in aes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Open Cryptanalysis Platform☆13Updated this week
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆20Oct 16, 2021Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- ☆16Feb 10, 2021Updated 5 years ago
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- ☆24Jul 4, 2025Updated 8 months ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Nov 21, 2016Updated 9 years ago
- ☆12May 7, 2021Updated 4 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- ☆15Oct 25, 2024Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Collection of sponge functions written in pure Rust☆51Mar 16, 2026Updated last week
- ☆55Jun 20, 2024Updated last year
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆130Feb 27, 2019Updated 7 years ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆38Feb 4, 2021Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- ☆13Jan 3, 2026Updated 2 months ago
- A Microsoft-SEAL-compatible implementation of homomorphic encryption targeting Azure Sphere and other embedded devices.☆55Jan 24, 2022Updated 4 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- FN-DSA (Falcon) signature scheme☆49Mar 11, 2026Updated last week
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated last week
- JavaScript XAES-256-GCM implementation using Web Cryptography API☆13Jul 9, 2024Updated last year