A collection of high-performance crypto implementations.
☆53Nov 27, 2025Updated 4 months ago
Alternatives and similar repositories for haberdashery
Users that are interested in haberdashery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 7 months ago
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Apr 11, 2026Updated last week
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- ☆39Apr 12, 2026Updated last week
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated last year
- Tool for plotting Go benchmark results☆17Jul 10, 2024Updated last year
- An implementation of an auditable key directory☆318Apr 8, 2026Updated last week
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated 2 weeks ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 months ago
- Learn Distributed Systems Together☆11Apr 2, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Fast constant-time AES implementations on 32-bit architectures☆71Oct 17, 2024Updated last year
- ☆24May 14, 2025Updated 11 months ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- AES Galois Extended Mode☆24Feb 9, 2026Updated 2 months ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- ☆12Oct 4, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- Package xaes256gcm implements the XAES-256-GCM extended-nonce AEAD.☆21Aug 8, 2024Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- ChatTea: A Rust-based chat app with an async server-client setup using Tokio, using a Terminal User Interface built with ratatui. It empl…☆13Sep 16, 2024Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆20Mar 26, 2025Updated last year
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- Lean cryptographic library usable for bare-metal environments☆87Updated this week
- Community Cryptography Test Vectors☆99Apr 5, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 5 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- ☆25Dec 9, 2024Updated last year
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Implements ristretto255, a fast prime-order group.☆109Feb 19, 2026Updated last month
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago