Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- A collection of Ascon implementations & documents (as submodules)☆54Mar 30, 2026Updated last month
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆280Jan 28, 2026Updated 3 months ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆14Nov 28, 2021Updated 4 years ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- A subset of BouncyCastle crypto primitives, refactored to use DirectByteBuffer.☆32Mar 31, 2024Updated 2 years ago
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 4 months ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆19Feb 27, 2025Updated last year
- A Python implementation of the Double Ratchet algorithm.☆17Jan 29, 2026Updated 3 months ago
- For use receiving email via SES, delivers email to S3, indexes mailboxes in DDB and broadcasts rich inbound email events via EventBridge.☆23Mar 5, 2026Updated last month
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆22Apr 24, 2026Updated last week
- Common sub-modules and procedures in lattice-based constructions☆27Apr 15, 2026Updated 2 weeks ago
- An unoptimized BLAKE3 implementation in Java☆32Aug 19, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Implementing the blind RSA scheme in Java☆14Nov 2, 2025Updated 5 months ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 11 months ago
- Web application for sharing events☆10May 8, 2019Updated 6 years ago
- Pub/sub prototype 50x faster than Redis☆14Nov 25, 2016Updated 9 years ago
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- elliptic-curve cryptography