google / hctr2Links
HCTR2 specification and test vectors
☆37Updated 9 months ago
Alternatives and similar repositories for hctr2
Users that are interested in hctr2 are comparing it to the libraries listed below
Sorting:
- ☆25Updated 6 months ago
- A collection of high-performance crypto implementations.☆52Updated 2 weeks ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated last month
- Post-quantum cryptography certificates☆74Updated this week
- Repo for DTLS 1.3☆32Updated 3 weeks ago
- Hybrid Public Key Encryption☆51Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 2 weeks ago
- BAT KEM/Signature Reference Implementation☆23Updated 3 years ago
- Securing platform software☆18Updated 2 years ago
- Lean cryptographic library usable for bare-metal environments☆77Updated this week
- Jitterentropy Library☆128Updated 2 months ago
- Reference implementations of post-quantum cryptographic primitives☆32Updated 2 months ago
- AES-GCM-SIV implementations (128 and 256 bit)☆116Updated 6 years ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- ☆26Updated this week
- Industry Working Group on Automated Cryptographic Algorithm Validation☆190Updated last week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Experimental implementation of KEMTLS in Rustls☆33Updated last week
- CRYPTOGAMS distribution repository☆62Updated 2 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆55Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 2 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- A tweakable block cipher☆31Updated last year
- The OPAQUE Asymmetric PAKE Protocol☆110Updated 9 months ago
- VDAF specification☆23Updated this week
- An RFC5297-compliant C implementation of AES-SIV☆20Updated 5 years ago
- Circuits for functions of interest to cryptography☆28Updated last year