Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things
☆36Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for sparkle
Users that are interested in sparkle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Feb 5, 2016Updated 10 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆28Jul 13, 2017Updated 8 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆32May 7, 2023Updated 3 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- NIST Lightweight Cryptography Primitives☆56Jun 10, 2022Updated 3 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆11Mar 28, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆40Dec 8, 2022Updated 3 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Finalists to the NIST lightweight cryptography competition☆41Jun 29, 2022Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆29Feb 27, 2024Updated 2 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆33Apr 13, 2026Updated last month
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Nov 21, 2016Updated 9 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- MIT 6.875☆14Dec 13, 2025Updated 5 months ago
- ☆20Dec 13, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 5 months ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- ☆20Nov 22, 2025Updated 5 months ago
- M4GB: Efficient Groebner Basis algorithm☆73Nov 27, 2018Updated 7 years ago
- ☆14Mar 3, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- Efficient ways to compute Pearson's correlation between columns of two matrices in various scientific computing languages☆29Mar 14, 2018Updated 8 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago