aashishdugar / ECDH-AlgorithmLinks
This is an implementation of the Elliptic-Curve Diffie-Hellman Cryptographic Algorithm.
☆16Updated 3 years ago
Alternatives and similar repositories for ECDH-Algorithm
Users that are interested in ECDH-Algorithm are comparing it to the libraries listed below
Sorting:
- Benchmarking AES-GCM on GPUs with OpenCL☆29Updated 9 years ago
- Fast software implementation in C of the FIPS 180-2 hash algorithms SHA-224, SHA-256, SHA-384 and SHA-512☆55Updated last year
- Cryptographic Library☆57Updated 3 months ago
- ChaCha20 + Poly1305☆23Updated 9 years ago
- TLS/DTLS Library☆33Updated 3 months ago
- Minimal implementation of ECDH & ECDSA on NIST P-256 for 32-bit micro-controllers☆29Updated 2 years ago
- Client and Server stubs for Remote Procedure Call over UDP connection☆18Updated 10 years ago
- Attempt for a cross platform AES-GCM encryption☆42Updated 4 years ago
- stuff☆34Updated 9 years ago
- Cryptography - AES / XTS-AES / RSA☆8Updated 8 years ago
- C Crypto library supporting DES, AES128, SHA256, CCM-AES128, ECDSA, ECDH, PKCS#1 v1.5☆12Updated 3 years ago
- A basic implementation of UDP-based Data Transfer protocol (UDT) in C☆92Updated 4 years ago
- ☆20Updated 9 years ago
- Small portable HMAC in C☆75Updated 7 months ago
- Small portable Elliptic-Curve Diffie-Hellman in C☆276Updated 3 years ago
- A mirror of the nettle repository☆68Updated 2 years ago
- Simple and secure ECC and ECDSA☆59Updated 2 years ago
- ChaCha20 stream cipher in C☆29Updated last year
- RSA encrypter, decrypter and key generator☆36Updated 6 years ago
- Byte-oriented AES-256 in CTR mode☆23Updated 2 years ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆27Updated 6 years ago
- An Open Source Library for Elliptic Curve Cryptosystem☆23Updated 13 years ago
- A Linux file system filter based on redirfs☆33Updated 5 years ago
- Overview For this assignment you will be developing an application that uses raw IP sockets to ‘walk’ around an ordered list of nodes (g…☆27Updated 10 years ago
- Portable C, C++ code for hash tables, bloom filters, string-search, string utilities, hash functions, arc4random☆54Updated 10 months ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆116Updated 6 years ago
- dynamic memory allocation tracer☆22Updated 2 years ago
- lwip-tap is an application of "lwIP - A Lightweight TCP/IP Stack"☆58Updated 12 years ago
- Software implementation in C of the FIPS 198 Keyed-Hash Message Authentication Code HMAC for SHA2 (namely HMAC-SHA-224, HMAC-SHA-256, HMA…☆134Updated 5 years ago
- Embeddable ASN.1 (DER) and X.509v3 decoder☆37Updated 6 years ago