Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Sep 4, 2014Updated 11 years ago
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- A collection of Ascon implementations & documents (as submodules)☆54Mar 30, 2026Updated last week
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆278Jan 28, 2026Updated 2 months ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆13Nov 28, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A subset of BouncyCastle crypto primitives, refactored to use DirectByteBuffer.☆31Mar 31, 2024Updated 2 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆18Feb 27, 2025Updated last year
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆22Mar 29, 2026Updated last week
- An unoptimized BLAKE3 implementation in Java☆32Aug 19, 2021Updated 4 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Implementing the blind RSA scheme in Java☆14Nov 2, 2025Updated 5 months ago
- Web application for sharing events☆10May 8, 2019Updated 6 years ago
- Pub/sub prototype 50x faster than Redis☆14Nov 25, 2016Updated 9 years ago
- HTTP Keyserver Protocol (HKP) handlers☆13Apr 25, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- Dart native extension library for Rust☆14Jan 15, 2018Updated 8 years ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated 3 weeks ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆70Feb 12, 2024Updated 2 years ago
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Mar 17, 2026Updated 3 weeks ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 3 months ago
- 🟣 Cryptography interview questions and answers to help you prepare for your next software architecture and design patterns interview in …☆24Jan 4, 2026Updated 3 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆21Aug 31, 2023Updated 2 years ago
- Public Adfree DNS over HTTPS Server☆46Jan 14, 2026Updated 2 months ago
- An open source taxonomy for the future of education. Mapping the learning and talent innovation landscape.☆31Nov 27, 2020Updated 5 years ago