Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"
☆104Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for supercop
Users that are interested in supercop are comparing it to the libraries listed below
Sorting:
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- cryptographic library for ed25519 and curve25519☆25Nov 14, 2023Updated 2 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆188Apr 21, 2020Updated 5 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆18Feb 22, 2021Updated 5 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆36Feb 17, 2026Updated 2 weeks ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- A library of DSP functions for SDR, developed for XTRX SDR☆13Feb 3, 2023Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Common Files☆13Feb 9, 2026Updated 3 weeks ago
- C# code sample to validate bearer token for Outlook Actionable Messages☆12May 12, 2020Updated 5 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- A fast implementation of the ECMA-182 CRC64 checksum using the CLMUL instruction set☆15Nov 1, 2016Updated 9 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Oct 18, 2021Updated 4 years ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 7 months ago
- AVX-512 utilities☆20Sep 22, 2014Updated 11 years ago
- Corpora used to seed NSS' fuzzing targets☆10Updated this week
- Experimental compression format (unmaintained, do not use!)☆32Jun 2, 2016Updated 9 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- ZK proofs for Brainfuck execution using powdr☆17Aug 28, 2024Updated last year
- ☆38Dec 16, 2021Updated 4 years ago
- Experiments in high-assurance crypto.☆50Dec 15, 2022Updated 3 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- ☆17Aug 26, 2025Updated 6 months ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Mar 16, 2020Updated 5 years ago
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago