google / adiantumLinks
Adiantum and HPolyC specification and test vectors
☆475Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆323Updated 2 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆204Updated last year
- a modern crypto messaging format☆1,007Updated 4 months ago
- ☆469Updated 6 months ago
- Noise Specification☆454Updated 6 years ago
- ☆183Updated 4 years ago
- Noise-C, a plain C implementation of the Noise protocol☆323Updated 10 months ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆135Updated 5 years ago
- Cryptographic library☆774Updated 4 months ago
- BLAKE2 official implementations☆666Updated 2 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆336Updated 3 years ago
- RIDL test suite and exploits☆355Updated 4 years ago
- Library for elliptic curves cryptography☆261Updated 2 years ago
- eXtended Keccak Code Package☆607Updated 2 weeks ago
- An open and flexible framework for developing enclave applications☆975Updated 3 years ago
- TLS 1.3 Specification☆567Updated 3 weeks ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆315Updated 2 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- privilege separation engine for OpenSSL / LibreSSL☆197Updated last year
- ☆97Updated 8 years ago
- A transparent and secure way to look up public keys.☆1,571Updated 3 years ago
- ☆278Updated last year
- Reference implementation of the Picnic post-quantum signature scheme☆162Updated last year
- Post-quantum Cryptography VPN☆331Updated 2 years ago
- A really tiny crypto library.☆158Updated last month
- An easy to use, easy to deploy crypto library☆644Updated 7 months ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year