ascon / javaasconLinks
Java implementation of the authenticated encryption algorithm Ascon
☆17Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below
Sorting:
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Updated 5 years ago
- elliptic-curve cryptography☆31Updated 2 years ago
- An unoptimized BLAKE3 implementation in Java☆31Updated 4 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Updated 3 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆54Updated last year
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆80Updated 3 weeks ago
- a Java Base58 codec☆11Updated 7 years ago
- Quick-n-dirty standalone Java implementation of ChaCha20 (256-bit key, 64- or 96-bit nonce)☆22Updated 5 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- RFC 5297 SIV mode of operation in Java☆48Updated last week
- Plain Java implementation of the Noise protocol☆139Updated last year
- Optimized (fast) Java Keccak/SHA3/SHAKED implementation☆13Updated 5 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆119Updated 4 years ago
- ECIES implementation with Curve25519.☆16Updated 6 months ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 8 years ago
- Standard curve database.☆121Updated last week
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆12Updated last year
- Pure Java implementation of EdDSA☆230Updated 2 years ago
- A Java implementation of the Libsodium crypto library. For the lazy dev.☆149Updated 5 months ago
- ☆77Updated 3 weeks ago
- ☆21Updated 2 weeks ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆55Updated last year
- Software of the NIST Post-Quantum submission NewHope☆45Updated 5 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Updated 2 years ago
- ☆22Updated 9 years ago
- A Java implementation of Shamir's Secret Sharing algorithm over GF(256).☆213Updated 2 years ago
- An implementation of the LowMC block cipher family.☆27Updated 8 years ago
- Asynchronous delegated key generation without shared secrets (DRAFT)☆70Updated 2 years ago
- Java implementation of Verifiable Credentials☆35Updated 2 weeks ago
- liboqs-java is an open source Java wrapper for the liboqs C library. The Open Quantum Safe (OQS) project provides software for prototypin…☆66Updated 6 months ago