cfrg / draft-irtf-cfrg-aegis-aeadLinks
Specification for the AEGIS family of authenticated encryption algorithms.
☆16Updated last month
Alternatives and similar repositories for draft-irtf-cfrg-aegis-aead
Users that are interested in draft-irtf-cfrg-aegis-aead are comparing it to the libraries listed below
Sorting:
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆16Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 2 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- High assurance Go secp256k1 (Mirror)☆27Updated last year
- A collection of high-performance crypto implementations.☆51Updated last month
- A cache hard password hash/KDF☆47Updated last year
- an authenticated, chunked cipher based on BLAKE3☆23Updated 3 weeks ago
- Compress sets of integers efficiently☆21Updated last month
- ☆23Updated 2 weeks ago
- An experimental authenticated cipher.☆11Updated 10 months ago
- Charm implementation in JavaScript (TypeScript)☆15Updated last month
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 2 months ago
- ☆12Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated last month
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆91Updated this week
- An implementation of the ROCCA-S encryption scheme.☆19Updated 7 months ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- Test cases for EdDSA signature verification edge cases☆17Updated 2 years ago
- Community Cryptography Test Vectors☆77Updated last month
- An AES-based 384 bit permutation.☆20Updated 3 weeks ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated last month
- Oblivious HTTP implementation☆28Updated 11 months ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- ☆18Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆27Updated last year
- ☆15Updated last month