A collection of Ascon implementations & documents (as submodules)
☆54Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for ascon_collection
Users that are interested in ascon_collection are comparing it to the libraries listed below
Sorting:
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆32Aug 29, 2023Updated 2 years ago
- ☆83Nov 18, 2025Updated 3 months ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆12Apr 11, 2022Updated 3 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- ☆55Jun 20, 2024Updated last year
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- ☆38Dec 16, 2021Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Rust implemention of Ascon☆20Feb 9, 2026Updated 3 weeks ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Feb 19, 2026Updated last week
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆69Feb 12, 2024Updated 2 years ago
- The third iteration of the bot that uploads all gamedata to idleon.info☆12Apr 2, 2025Updated 11 months ago
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated last year
- A 3D , third person Car adventure game. A time chase mission, freedrive and cityView. Made from scratch using pure C++ and OpenGL API.☆11Apr 17, 2018Updated 7 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- 3D City Architecture Computer Graphics System Design☆10Nov 1, 2021Updated 4 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Quickly retrieve all keys and download links of your bundle from IndieGala or Humble Bundle. This is not a hack or anything like that to …☆10Sep 2, 2019Updated 6 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- Virtual Private Database toolset for Postgres☆12Jun 6, 2021Updated 4 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Network on chip based neural network accelerator☆10Mar 25, 2021Updated 4 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- An investigation into using Files and FileStream with System.IO.Pipelines☆10Jul 15, 2019Updated 6 years ago
- Webcam virtual backgrounds with Rust, Tensorflow & RobustVideoMatting☆11Sep 26, 2023Updated 2 years ago
- Elliptic curve algorithm wrappers☆14Oct 17, 2024Updated last year
- A python code for HART-IP Specification☆12Aug 18, 2016Updated 9 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- ☆10Jan 19, 2022Updated 4 years ago
- This is a secure dark web messaging app that uses end-to-end encryption. Elliptic curve SECP256k1, RSA 4096 Bit, AES-256 Your messages ar…☆13Jun 14, 2023Updated 2 years ago