Software optimized implementations of GIFT and GIFT-COFB
☆18Mar 29, 2022Updated 4 years ago
Alternatives and similar repositories for gift
Users that are interested in gift are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆71Oct 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The GIFT Block Cipher☆13Nov 11, 2025Updated 5 months ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Nov 12, 2018Updated 7 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 7 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Fork a process and read/write from it☆13Jun 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆33Jan 17, 2022Updated 4 years ago
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆95Oct 19, 2023Updated 2 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- ☆13Apr 3, 2026Updated last month
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆34Jun 28, 2018Updated 7 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- FIPS 202 compliant SHA-3 core in Verilog☆24Oct 8, 2020Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆84Sep 2, 2022Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago