catid / gf256
GF256 - Fast 8-bit Galois Field Math in C
☆53Updated 3 years ago
Alternatives and similar repositories for gf256:
Users that are interested in gf256 are comparing it to the libraries listed below
- FEC-AL : O(N^2) Fountain Code for Small Data☆38Updated 4 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- Cauchy Caterpillar : O(N^2) Short-Window Streaming Erasure Code☆36Updated 4 years ago
- Leopard-RS : O(N Log N) MDS Reed-Solomon Block Erasure Code for Large Data☆147Updated last year
- Siamese : Infinite-Window Streaming Erasure Code (HARQ)☆49Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Optimized block functions for the ChaCha stream cipher☆50Updated 5 years ago
- An Open-Source RaptorQ Implementation in C++☆49Updated 10 years ago
- High-order countermeasures for AES and DES☆25Updated 8 months ago
- Constant time memcmp() function☆21Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆39Updated 5 months ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- fast compact raptorq (rfc6330) codec in c☆52Updated last year
- Quick sort code using AVX2 instructions☆68Updated 7 years ago
- Frobenius Additive Fourier Transform☆13Updated 2 months ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Updated 2 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 4 years ago
- ☆22Updated 9 months ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Longhair : O(N^2) Cauchy Reed-Solomon Block Erasure Code for Small Data☆162Updated 8 months ago
- Finite field math in python including generic matrix operations and Reed-Solomon error correcting codes.☆64Updated 2 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- CLI utilty to work out proper constants for vpternlogic instruction☆13Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆49Updated 8 months ago
- Implementation of cryptographic program obfuscation☆41Updated 7 years ago
- A Python implementation of the SPHINCS-256 scheme☆14Updated 9 years ago
- Microbenchmarks for x86_64 kernel entry methods☆18Updated 3 years ago
- C++ STL for speed and cryptanalytic application☆10Updated 2 weeks ago
- An optimized sample code for SHA256 and SHA512 using C intrinsic☆18Updated 4 years ago