dsprenkels / randombytes
A portable C library for generating cypto-secure random bytes
☆97Updated 2 years ago
Alternatives and similar repositories for randombytes
Users that are interested in randombytes are comparing it to the libraries listed below
Sorting:
- A software AES implementation to torture code generators.☆18Updated 3 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆169Updated last year
- Very small, readable implementation of the SHA3 hash function.☆213Updated 8 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆691Updated last month
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆103Updated 4 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆174Updated 5 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆114Updated 5 years ago
- Implementations of a fast Message-Authentication Code☆117Updated 2 years ago
- ☆35Updated 3 years ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆54Updated last year
- Implementation of Shamir's Secret Sharing in C☆67Updated 9 months ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- [Basically feature complete] Keccak-family hashing library☆61Updated 7 months ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆85Updated 2 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆40Updated 5 months ago
- C implementation of Elligator 2 for Curve25519☆31Updated 3 years ago
- NewHope key exchange mechanism implementation on Cortex-M series microcontrollers.☆13Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆133Updated 2 years ago
- ☆50Updated 7 years ago
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆50Updated last year
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago