dmhacker / dual-ec-drbg
Interactive proof-of-concept of the Dual_EC_DRBG backdoor
☆13Updated 2 years ago
Alternatives and similar repositories for dual-ec-drbg:
Users that are interested in dual-ec-drbg are comparing it to the libraries listed below
- ☆23Updated last week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- Haraka is a secure and efficient short-input hash function.☆56Updated 7 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 4 months ago
- ☆22Updated 2 years ago
- A collection of high-performance crypto implementations.☆51Updated 2 weeks ago
- A tweakable block cipher☆31Updated 11 months ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆18Updated 7 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 8 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago
- List of crackpot 'scientists' and 'thinkers'☆16Updated 8 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ☆81Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆81Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- A tiny library to properly encrypt IP addresses.☆15Updated this week
- Implementations of do255e and do255s in C and assembly☆25Updated 3 years ago
- ☆19Updated 4 years ago
- QARMA block cipher in C☆28Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated 3 weeks ago
- AES Galois Extended Mode☆14Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago