bitcoin-core / ctaes
Simple constant-time AES implementation
☆116Updated last week
Alternatives and similar repositories for ctaes:
Users that are interested in ctaes are comparing it to the libraries listed below
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago
- Highly efficient implementation of elliptic curve 25519☆152Updated 2 years ago
- Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.☆31Updated 2 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆332Updated 3 years ago
- Tor client library implementation.☆50Updated 12 years ago
- Simple ChaCha20Poly1305@Bitcoin C implementation☆29Updated 5 years ago
- bitcoin c library☆36Updated 3 years ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆122Updated this week
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆98Updated 4 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆173Updated 4 years ago
- Small portable HMAC in C☆70Updated 3 months ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 4 years ago
- ChaCha20 stream cipher implemented in C☆62Updated 4 years ago
- ☆81Updated 4 years ago
- Bounds on divsteps iterations in safegcd☆52Updated 4 months ago
- ☆11Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- A small C library for the XChaCha20 stream cipher☆35Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 5 months ago
- Very small, readable implementation of the SHA3 hash function.☆204Updated 8 years ago
- C Implementation of NTRUEncrypt☆209Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆54Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- C++ SAMv3 library☆36Updated 4 months ago
- Optimized Binary GCD for Modular Inversion☆41Updated 4 years ago