ascon / crypto_aeadLinks
deprecated. new repo: https://github.com/ascon/ascon-c
☆11Updated 4 years ago
Alternatives and similar repositories for crypto_aead
Users that are interested in crypto_aead are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆102Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- A collection of Ascon implementations & documents (as submodules)☆49Updated 5 months ago
- Fast, constant-time and masked AES assembly implementations for ARM Cortex-M3 and M4☆93Updated 2 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- The development of Mbed Crypto has moved to Mbed TLS. No updates will be made to the mbed-crypto repository anymore.☆105Updated last year
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Updated 10 years ago
- ☆23Updated 3 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆68Updated 2 years ago
- masked, bit-sliced AES-128 demo code☆14Updated 9 months ago
- ☆12Updated 5 years ago
- Library for elliptic curves cryptography☆263Updated 2 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Implementations of some lightweight block ciphers in C☆19Updated 7 years ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- CryptoBib Database for Developers☆45Updated last week
- P-256 ECDSA / ECDH for Cortex-M4 and Cortex-M33☆43Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- Post-quantum cryptography certificates☆72Updated 2 weeks ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Updated 7 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- Documentation source and development of the PSA Certified API☆71Updated this week
- Implementation of Kravatte Encryption Suite☆15Updated 6 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆53Updated last year