ascon / javaascon
Java implementation of the authenticated encryption algorithm Ascon
☆15Updated 10 months ago
Related projects: ⓘ
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆61Updated last month
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆26Updated last year
- ☆56Updated 10 months ago
- ☆32Updated 2 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆17Updated 2 years ago
- elliptic-curve cryptography☆28Updated 11 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Updated 3 years ago
- Post-quantum cryptography certificates☆36Updated last week
- ☆12Updated this week
- Security Estimation Scripts for Kyber and Dilithium☆22Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Open source Apis to access a Secure Element from a Web application☆18Updated 7 years ago
- A collection of Ascon implementations & documents (as submodules)☆41Updated 7 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆9Updated 10 months ago
- Secure Multiparty Key Generation, Signature and Decryption javacard applet☆34Updated 4 years ago
- liboqs-java is an open source Java wrapper for the liboqs C library. The Open Quantum Safe (OQS) project provides software for prototypin…☆32Updated 3 weeks ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- Raccoon Signature Scheme -- Reference Code☆10Updated last year
- Banquet implementation☆13Updated 2 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆15Updated 7 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆15Updated 7 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Updated 3 years ago
- ☆7Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- CryptoBib Main Repository for Developers☆18Updated 3 weeks ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆33Updated last year
- Hardware implementations of the authenticated encryption design ASCON☆19Updated 7 years ago
- Apache milagro (Incubating)☆35Updated 5 months ago
- ☆51Updated 3 months ago