Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- A collection of Ascon implementations & documents (as submodules)☆56Mar 30, 2026Updated last month
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆35Aug 29, 2023Updated 2 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 4 years ago
- ☆87Nov 18, 2025Updated 6 months ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆291Jan 28, 2026Updated 3 months ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆14Nov 28, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A subset of BouncyCastle crypto primitives, refactored to use DirectByteBuffer.☆32Mar 31, 2024Updated 2 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆19Feb 27, 2025Updated last year
- A Python implementation of the Double Ratchet algorithm.☆17May 3, 2026Updated 2 weeks ago
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆24May 11, 2026Updated last week
- Common sub-modules and procedures in lattice-based constructions☆27Apr 15, 2026Updated last month
- An unoptimized BLAKE3 implementation in Java☆33Aug 19, 2021Updated 4 years ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated last year
- Web application for sharing events☆10May 8, 2019Updated 7 years ago
- Pub/sub prototype 50x faster than Redis☆14Nov 25, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- HTTP Keyserver Protocol (HKP) handlers☆12Apr 25, 2018Updated 8 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 3 years ago
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated 2 months ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆70Feb 12, 2024Updated 2 years ago
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Mar 17, 2026Updated 2 months ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 4 months ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆22Aug 31, 2023Updated 2 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- AEGIS-256☆11Apr 10, 2026Updated last month