bozhu / PRESENT-C
An efficient software implementation of the block cipher PRESENT for 8-bit platforms
☆14Updated 11 years ago
Related projects: ⓘ
- AVX2 Chacha implementation☆16Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆17Updated 6 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 10 months ago
- ☆19Updated last year
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆21Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆57Updated 7 years ago
- Simple application for playing with elliptic curves☆42Updated last year
- ☆20Updated this week
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆18Updated 7 years ago
- Implementation of cryptographic program obfuscation☆41Updated 6 years ago
- ☆17Updated this week
- Haraka is a secure and efficient short-input hash function.☆50Updated 6 years ago
- ☆14Updated this week
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- Standalone McEliece implemetation☆13Updated 7 years ago
- SIDH C reference implementation☆13Updated 7 years ago
- Reference implementations of the GIMLI permutation☆13Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- Source code of the Whitebox Contest Submission Server☆35Updated last month
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Framework for building transparent memory encryption and authentication solutions☆25Updated 6 years ago
- Experiments in high-assurance crypto.☆46Updated last year
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 4 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated last week
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago