☆292Jan 22, 2026Updated 2 months ago
Alternatives and similar repositories for isa-l_crypto
Users that are interested in isa-l_crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intelligent Storage Acceleration Library☆1,062Mar 5, 2026Updated 2 weeks ago
- Intel(R) Multi-Buffer Crypto for IPSec☆330Mar 13, 2026Updated last week
- Intel® Cryptography Primitives Library is a secure, fast and lightweight library of building blocks for cryptography, highly-optimized fo…☆375Updated this week
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- ISA-L and intel-ipsec-mb obsolete soft-crc project. Please refer and use them instead for efficient CRC implementation. https://github.co…☆56Apr 2, 2024Updated last year
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆221Jan 8, 2026Updated 2 months ago
- Intel QuickAssist Technology( QAT) OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware…☆437Aug 20, 2025Updated 7 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- ☆39Sep 9, 2025Updated 6 months ago
- Accelerate SHA256 computations in pure Go using AVX512, SHA Extensions for x86 and ARM64 for ARM. On AVX512 it provides an up to 8x impr…☆1,039May 24, 2023Updated 2 years ago
- ☆13Sep 30, 2020Updated 5 years ago
- ☆20Nov 17, 2015Updated 10 years ago
- Intel® Query Processing Library (Intel® QPL)☆107Mar 5, 2026Updated 2 weeks ago
- A programming language to write bitsliced ciphers☆60Sep 4, 2024Updated last year
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated 11 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Leopard-RS : O(N Log N) MDS Reed-Solomon Block Erasure Code for Large Data☆161Mar 23, 2024Updated 2 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Constant time big numbers for Go☆106Feb 26, 2025Updated last year
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- Storage Performance Development Kit☆3,509Updated this week
- Quick sort code using AVX2 instructions☆69Jun 5, 2017Updated 8 years ago
- SIMD procedures for nim on x86☆12Nov 17, 2014Updated 11 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Benchmark showing the we can randomly hash strings very quickly with good universality☆137Jan 23, 2025Updated last year
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆53Apr 5, 2024Updated last year
- this repository is a read only mirror, the upstream is☆76Nov 9, 2022Updated 3 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Trying to get perfect codegen for big-integer math.☆31Nov 4, 2022Updated 3 years ago
- ☆74Aug 4, 2022Updated 3 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last month
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago