aadomn / aesLinks
Fast constant-time AES implementations on 32-bit architectures
☆67Updated last year
Alternatives and similar repositories for aes
Users that are interested in aes are comparing it to the libraries listed below
Sorting:
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated 3 weeks ago
- Lean cryptographic library usable for bare-metal environments☆79Updated this week
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆56Updated 2 years ago
- ☆57Updated last year
- ☆38Updated 4 years ago
- ☆19Updated last month
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆55Updated last year
- MAYO C implementation☆20Updated 8 months ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Crypto library☆66Updated 2 weeks ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated last month
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 7 months ago
- Finalists to the NIST lightweight cryptography competition☆38Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A programming language to write bitsliced ciphers☆58Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Updated 5 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆64Updated last year
- Experimental implementation of KEMTLS in Rustls☆33Updated last month
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆118Updated last week
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 6 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago