bitcoin-core / ctaesLinks
Simple constant-time AES implementation
☆121Updated last year
Alternatives and similar repositories for ctaes
Users that are interested in ctaes are comparing it to the libraries listed below
Sorting:
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32, ARM64 and LoongArch64 assembly☆134Updated last week
- A small C library for the XChaCha20 stream cipher☆39Updated 2 years ago
- Highly efficient implementation of elliptic curve 25519☆158Updated 3 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- Tor client library implementation.☆51Updated 13 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Updated 7 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆342Updated 4 years ago
- ☆13Updated 2 years ago
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- bitcoin c library☆37Updated 4 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- Small portable HMAC in C☆83Updated last year
- An ELF / PE binary packer written in pure C, made for fun☆107Updated last year
- ChaCha20 stream cipher implemented in C☆84Updated last year
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated last year
- Load a DLL from memory☆35Updated 4 years ago
- ☆113Updated 3 years ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆104Updated 5 years ago
- Template for writing shellcode in rust☆26Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆104Updated 8 years ago
- Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.☆34Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Packer/Protector for x86-64 ELF binaries on Linux☆192Updated 4 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year