aadomn / giftLinks
Software optimized implementations of GIFT and GIFT-COFB
☆18Updated 3 years ago
Alternatives and similar repositories for gift
Users that are interested in gift are comparing it to the libraries listed below
Sorting:
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆21Updated 5 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated last week
- ☆36Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- ☆17Updated last week
- Reference repository on Lattice-based Cryptography☆26Updated last year
- MAYO C implementation☆19Updated 6 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 4 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 5 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Banquet implementation☆13Updated 3 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆53Updated last year
- Reference implementations of post-quantum cryptographic primitives☆32Updated last month
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Updated last year
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆21Updated 2 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆29Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆26Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- ☆12Updated 4 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆55Updated 4 months ago
- CryptoBib Database for Developers☆45Updated last month
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Updated 3 years ago