dsprenkels / randombytesLinks
A portable C library for generating cypto-secure random bytes
☆99Updated 3 years ago
Alternatives and similar repositories for randombytes
Users that are interested in randombytes are comparing it to the libraries listed below
Sorting:
- ⚙️ shitty desktop RISC-V linux emulator☆76Updated 10 months ago
- A software AES implementation to torture code generators.☆18Updated 4 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 4 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆863Updated 3 weeks ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆213Updated last year
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆188Updated 5 years ago
- C++ bindings for liboqs☆53Updated 8 months ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Updated 10 years ago
- Experimental implementation of KEMTLS in Rustls☆34Updated 2 months ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- Very small, readable implementation of the SHA3 hash function.☆226Updated 9 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆104Updated 8 years ago
- Code and data for benchmarking post-quantum cryptography in TLS 1.3☆22Updated 4 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆31Updated 10 months ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- MIRACL Core☆237Updated last week
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆104Updated 5 years ago
- C Implementation of NTRUEncrypt☆216Updated 4 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆54Updated 3 years ago
- Highly efficient implementation of elliptic curve 25519☆158Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- ☆38Updated 4 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆44Updated 2 weeks ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆194Updated 2 months ago
- C implementation of Elligator 2 for Curve25519☆30Updated 4 years ago
- ☆561Updated 3 months ago