Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below
Sorting:
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆84Nov 18, 2025Updated 4 months ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆276Jan 28, 2026Updated last month
- A flyer we provide to every visitor of the Grazer Linuxtage☆13Nov 28, 2021Updated 4 years ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- A subset of BouncyCastle crypto primitives, refactored to use DirectByteBuffer.☆31Mar 31, 2024Updated last year
- A Python implementation of the Double Ratchet algorithm.☆18Jan 29, 2026Updated last month
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.☆22Jan 17, 2024Updated 2 years ago
- An unoptimized BLAKE3 implementation in Java☆32Aug 19, 2021Updated 4 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Implementing the blind RSA scheme in Java☆14Nov 2, 2025Updated 4 months ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 10 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Web application for sharing events☆10May 8, 2019Updated 6 years ago
- HTTP Keyserver Protocol (HKP) handlers☆13Apr 25, 2018Updated 7 years ago
- Dart native extension library for Rust☆14Jan 15, 2018Updated 8 years ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last week
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Updated this week
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆70Feb 12, 2024Updated 2 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- 🟣 Cryptography interview questions and answers to help you prepare for your next software architecture and design patterns interview in …☆24Jan 4, 2026Updated 2 months ago
- A file encrypt & decrypt package based on TEA☆15Oct 27, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆20Aug 31, 2023Updated 2 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- AEGIS-256☆11Apr 17, 2022Updated 3 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Experimental committing AEAD designed by Soatok.☆10Sep 10, 2020Updated 5 years ago
- This Imdb Class allows you to fetch Movie details from Imdb.com. It uses XPath / Dom Traversing for scrapping content from imdb.com.☆21Aug 16, 2018Updated 7 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 8 months ago