inmcm / kravatteView external linksLinks
Implementation of Kravatte Encryption Suite
☆15Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for kravatte
Users that are interested in kravatte are comparing it to the libraries listed below
Sorting:
- ☆38Dec 16, 2021Updated 4 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- A copy of the verifiable computation projects from Microsoft Research, Pinnochio and Gepetto☆18Sep 17, 2019Updated 6 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- Collection of sponge functions written in pure Rust☆49Jan 22, 2026Updated 3 weeks ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- an authenticated, chunked cipher based on BLAKE3☆23May 7, 2025Updated 9 months ago
- ☆52May 12, 2023Updated 2 years ago
- SIMON and SPECK, the two lightweight block ciphers designed by the researchers from NSA☆24Jul 12, 2013Updated 12 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- Deoxys-II-256-128 MRAE primitives for Rust☆24Apr 17, 2024Updated last year
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 9 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- C implementation of Elligator 2 for Curve25519☆30Jun 26, 2021Updated 4 years ago
- Python bindings to the Crypto++ library☆50Jul 29, 2023Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- ☆35Mar 8, 2021Updated 4 years ago
- ☆42Oct 19, 2021Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Website for www.ambitionfund.org, micro-grant program to provide support for underrepresented people who need financial assistance pursui…☆13Jan 6, 2023Updated 3 years ago
- Keyctl CAAM Security☆15Dec 15, 2025Updated last month
- ☆10Mar 4, 2024Updated last year
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago