☆295Jan 22, 2026Updated 3 months ago
Alternatives and similar repositories for isa-l_crypto
Users that are interested in isa-l_crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intelligent Storage Acceleration Library☆1,070Apr 16, 2026Updated 2 weeks ago
- Intel(R) Multi-Buffer Crypto for IPSec☆332Updated this week
- Intel® Cryptography Primitives Library is a secure, fast and lightweight library of building blocks for cryptography, highly-optimized fo…☆378Updated this week
- Multiplication using AVX512 and AVX512IFMA instructions☆24Nov 9, 2015Updated 10 years ago
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆224Jan 8, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Intel QuickAssist Technology( QAT) OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware…☆440Apr 10, 2026Updated 3 weeks ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 6 months ago
- ☆39Sep 9, 2025Updated 7 months ago
- ☆13Sep 30, 2020Updated 5 years ago
- ☆20Nov 17, 2015Updated 10 years ago
- Intel® Query Processing Library (Intel® QPL)☆107Apr 23, 2026Updated last week
- A programming language to write bitsliced ciphers☆61Sep 4, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Leopard-RS : O(N Log N) MDS Reed-Solomon Block Erasure Code for Large Data☆166Mar 23, 2024Updated 2 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Apr 24, 2026Updated last week
- Constant time big numbers for Go☆105Feb 26, 2025Updated last year
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Compression Library accelerated by Intel® QuickAssist Technology☆162Feb 17, 2026Updated 2 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated 2 months ago
- zk-SNARK library☆15Jun 19, 2020Updated 5 years ago
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- Storage Performance Development Kit☆3,536Updated this week
- Quick sort code using AVX2 instructions☆69Jun 5, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Benchmark showing the we can randomly hash strings very quickly with good universality☆137Jan 23, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆53Apr 5, 2024Updated 2 years ago
- A feature-incomplete peekahole (pahole) clone that doesn't rely on libdwarves (and doesn't choke on Clang output)☆24Oct 23, 2017Updated 8 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Trying to get perfect codegen for big-integer math.☆31Nov 4, 2022Updated 3 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆18Feb 19, 2026Updated 2 months ago
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago