itzmeanjan / asconLinks
Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions
☆21Updated 3 weeks ago
Alternatives and similar repositories for ascon
Users that are interested in ascon are comparing it to the libraries listed below
Sorting:
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆31Updated 2 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 5 years ago
- Reference repository on Lattice-based Cryptography☆26Updated 10 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- ☆18Updated 5 months ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Falcon signature and its ZKP extensions☆20Updated 3 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- Raccoon Signature Scheme -- Reference Code☆11Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- ☆10Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- C++ implementation of Distributed Verifiable Random Functions☆25Updated 5 years ago
- A basic implementation of Yao's Garbled Circuits☆29Updated 3 years ago
- elliptic curve construction tool☆17Updated 2 years ago
- ☆22Updated 8 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆38Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- distributed RSA modulus generation in Rust☆15Updated 3 years ago
- An implementation of a post quantum anonymous credential scheme☆15Updated 8 months ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 5 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆22Updated 2 weeks ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆66Updated 10 months ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Updated 2 years ago
- Code for zero-knowledge middleboxes☆63Updated 3 years ago