dsprenkels / randombytes
A portable C library for generating cypto-secure random bytes
☆97Updated 2 years ago
Alternatives and similar repositories for randombytes:
Users that are interested in randombytes are comparing it to the libraries listed below
- ⚙️ Attempt to run Linux in a GPU shader☆70Updated last year
- A software AES implementation to torture code generators.☆16Updated 3 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆222Updated 3 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆625Updated last week
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆25Updated 9 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆146Updated 9 months ago
- Fast constant-time AES implementations on 32-bit architectures☆62Updated 3 months ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆173Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆29Updated 5 months ago
- ☆32Updated 3 years ago
- Portable C implementation of Ed25519, a high-speed high-security public-key signature system.☆505Updated 2 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Very small, readable implementation of the SHA3 hash function.☆204Updated 8 years ago
- eXtended Keccak Code Package☆596Updated 6 months ago
- X25519 Implementation for ARM Cortex-M0/M0+☆15Updated 4 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆54Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Highly efficient implementation of elliptic curve 25519☆152Updated 2 years ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆98Updated 4 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- Implementation of Shamir's Secret Sharing in C☆63Updated 5 months ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆112Updated 5 years ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- Wei25519, Curve25519 and Ed25519 for low-memory systems☆18Updated last year
- Performance Evaluation of SHA-256 using SHA New Instructions.☆41Updated 3 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Implementations of a fast Message-Authentication Code☆113Updated 2 years ago