facebookincubator / haberdasheryView external linksLinks
A collection of high-performance crypto implementations.
☆52Nov 27, 2025Updated 2 months ago
Alternatives and similar repositories for haberdashery
Users that are interested in haberdashery are comparing it to the libraries listed below
Sorting:
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Sep 16, 2025Updated 5 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- ☆25May 14, 2025Updated 9 months ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated last week
- ☆25Dec 9, 2024Updated last year
- ☆12Oct 4, 2023Updated 2 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- libsxe, mak and related components☆50Feb 12, 2023Updated 3 years ago
- Tool for plotting Go benchmark results☆17Jul 10, 2024Updated last year
- Development environment for starting OpenBao (Vault) instances☆13Nov 26, 2025Updated 2 months ago
- Make std::mdspan formattable by std::format.☆11Dec 25, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 7 months ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆18Nov 11, 2025Updated 3 months ago
- Formal Analysis of the PQXDH Protocol☆30Jun 6, 2024Updated last year
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- FIPS-204 (ML-DSA) implementation in Go☆18Updated this week
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last week
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- An algorithm for generating random doubles.☆13Feb 21, 2017Updated 8 years ago
- Entropy Source and DRNG Manager☆12Feb 3, 2026Updated last week
- ☆22Feb 10, 2026Updated last week
- Rust bindings for HACL & Evercrypt☆30Apr 24, 2025Updated 9 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Core OpenGL samples and tests written in C++11.☆14Oct 7, 2025Updated 4 months ago
- Core Aranya tech including policy compiler, parser, interface generator, VM, DAG☆17Feb 9, 2026Updated last week
- Lean cryptographic library usable for bare-metal environments☆82Feb 9, 2026Updated last week
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Nov 18, 2023Updated 2 years ago
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated 11 months ago
- RLU resizable hash-table☆17Aug 24, 2015Updated 10 years ago
- Stupid crypto tricks☆18May 12, 2021Updated 4 years ago