dsprenkels / randombytesLinks
A portable C library for generating cypto-secure random bytes
☆99Updated 3 years ago
Alternatives and similar repositories for randombytes
Users that are interested in randombytes are comparing it to the libraries listed below
Sorting:
- ⚙️ shitty desktop RISC-V linux emulator☆76Updated 10 months ago
- PQClean for Node.js, Deno, and browsers 🔏🔑 Node.js native addon and WebAssembly implementation☆80Updated last month
- A software AES implementation to torture code generators.☆18Updated 4 years ago
- Node.js bindings for the reference implementation of the Classic McEliece KEM.☆13Updated last year
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 4 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆861Updated last week
- Very small, readable implementation of the SHA3 hash function.☆224Updated 9 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆209Updated last year
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆188Updated 5 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆91Updated 3 years ago
- Library for elliptic curves cryptography☆60Updated 10 months ago
- C++ bindings for liboqs☆53Updated 7 months ago
- ☆38Updated 4 years ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆104Updated 5 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- MIRACL Core☆237Updated last week
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- Library for elliptic curves cryptography☆263Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Updated 10 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆48Updated 9 years ago
- ☆554Updated 3 months ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆128Updated 6 years ago
- Implementation of Shamir's Secret Sharing in C☆69Updated last year