google / adiantum
Adiantum and HPolyC specification and test vectors
☆475Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- TLS 1.3 Specification☆567Updated last month
- An open and flexible framework for developing enclave applications☆974Updated 3 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆204Updated last year
- Noise Specification☆454Updated 6 years ago
- Cryptographic library☆766Updated 3 months ago
- Constant-Time Toolkit☆295Updated 6 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆322Updated 2 years ago
- MLS protocol☆236Updated 8 months ago
- Noise-C, a plain C implementation of the Noise protocol☆319Updated 9 months ago
- Understand and mitigate software-observable side-channels☆502Updated 4 years ago
- ☆468Updated 5 months ago
- ☆381Updated last week
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- A reversible DER and BER pretty-printer.☆244Updated last month
- Guidelines for low-level cryptography software☆1,152Updated last year
- Supersingular Isogeny Diffie-Hellman in Go☆135Updated 5 years ago
- Post-quantum Cryptography VPN☆331Updated 2 years ago
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆334Updated 3 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆167Updated 5 years ago
- ☆97Updated 8 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,834Updated last week
- Crypto Audit Guidelines☆134Updated 4 years ago
- a modern crypto messaging format☆1,007Updated 3 months ago
- Auditing for TLS certificates.☆873Updated last year
- eXtended Keccak Code Package☆604Updated 2 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆188Updated this week
- Cryptographic Primitive Code Generation by Fiat☆756Updated this week
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year
- ☆183Updated 4 years ago