Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below
Sorting:
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆13Nov 28, 2021Updated 4 years ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- Py-SSA-Lib: Python implementation of the multichannel singular spectrum analysis (MSSA) and singular spectrum analysis (SSA)☆13Jul 21, 2025Updated 8 months ago
- A subset of BouncyCastle crypto primitives, refactored to use DirectByteBuffer.☆31Mar 31, 2024Updated last year
- A Python implementation of the Double Ratchet algorithm.☆18Jan 29, 2026Updated last month
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆21Mar 9, 2026Updated last week
- Common sub-modules and procedures in lattice-based constructions☆25Jan 20, 2026Updated 2 months ago
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.☆22Jan 17, 2024Updated 2 years ago
- An unoptimized BLAKE3 implementation in Java☆32Aug 19, 2021Updated 4 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 10 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Web application for sharing events☆10May 8, 2019Updated 6 years ago
- HTTP Keyserver Protocol (HKP) handlers☆13Apr 25, 2018Updated 7 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- Dart native extension library for Rust☆14Jan 15, 2018Updated 8 years ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last week
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Updated this week
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- 🟣 Cryptography interview questions and answers to help you prepare for your next software architecture and design patterns interview in …☆24Jan 4, 2026Updated 2 months ago
- Python library of efficient and numerically-precise randomness extractors☆33Jul 28, 2025Updated 7 months ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆20Aug 31, 2023Updated 2 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago