Fast constant-time AES implementations on 32-bit architectures
☆69Oct 17, 2024Updated last year
Alternatives and similar repositories for aes
Users that are interested in aes are comparing it to the libraries listed below
Sorting:
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆12May 7, 2021Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆20Oct 16, 2021Updated 4 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 weeks ago
- A collection of high-performance crypto implementations.☆53Nov 27, 2025Updated 3 months ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Zcash-flavored Ed25519 for use in Zebra.☆35Feb 20, 2026Updated last week
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 5 months ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago