google / adiantumLinks
Adiantum and HPolyC specification and test vectors
☆475Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- Noise-C, a plain C implementation of the Noise protocol☆327Updated 11 months ago
- Constant-Time Toolkit☆296Updated 6 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆204Updated last year
- TLS 1.3 Specification☆567Updated last week
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- Noise Specification☆455Updated 6 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆115Updated 5 years ago
- ☆470Updated 7 months ago
- Jitterentropy RNGd☆97Updated last year
- Jitterentropy Library☆116Updated this week
- The BLAKE3 paper: specifications, analysis, and design rationale☆179Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆337Updated 3 years ago
- Checking that functions are constant time with Valgrind☆184Updated 8 years ago
- ☆198Updated this week
- A set of FIDO2 / WebAuthn demo servers☆359Updated 3 years ago
- Library for elliptic curves cryptography☆260Updated 2 years ago
- Implementations of a fast Message-Authentication Code☆119Updated 2 years ago
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆702Updated 2 months ago
- Network Security Services (NSS)☆162Updated this week
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- An open and flexible framework for developing enclave applications☆975Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆164Updated 2 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆153Updated 7 years ago
- ☆386Updated last week
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆475Updated 5 years ago
- BetterTLS: A Name Constraints test suite for HTTPS clients.☆170Updated 6 months ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆177Updated 5 years ago
- Robust Internet of Things, Microsoft Research☆85Updated 2 years ago
- Tools for dealing with Chrome's CRLSets☆143Updated last year