bozhu / PRESENT-C
An efficient software implementation of the block cipher PRESENT for 8-bit platforms
☆14Updated 11 years ago
Alternatives and similar repositories for PRESENT-C:
Users that are interested in PRESENT-C are comparing it to the libraries listed below
- AVX2 Chacha implementation☆16Updated 11 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 9 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- ☆14Updated 7 years ago
- ☆19Updated 2 years ago
- Source code of the Whitebox Contest Submission Server☆35Updated 7 months ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- Implementation of cryptographic program obfuscation☆41Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- C library for bilinear pairings☆26Updated 7 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆18Updated 7 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- Reference implementations of the GIMLI permutation☆13Updated 7 years ago
- A blake2s java implementation☆19Updated 9 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Updated 2 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆15Updated 8 years ago