itzmeanjan / asconLinks
Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions
☆21Updated 2 months ago
Alternatives and similar repositories for ascon
Users that are interested in ascon are comparing it to the libraries listed below
Sorting:
- Reference repository on Lattice-based Cryptography☆26Updated last year
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆32Updated 3 months ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- MAYO C implementation☆19Updated 6 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- An implementation of a post quantum anonymous credential scheme☆15Updated 10 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆23Updated last week
- Security Estimation Scripts for Kyber and Dilithium☆42Updated 4 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆26Updated last year
- ☆18Updated 6 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- ☆10Updated last year
- Falcon signature and its ZKP extensions☆20Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Curve ecGFp5☆68Updated 3 years ago
- Latex classes for IACR publications.☆14Updated 2 weeks ago
- Raccoon Signature Scheme -- Reference Code☆11Updated 2 years ago
- ☆17Updated last week
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆21Updated 5 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆38Updated last year
- ☆21Updated 6 years ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆37Updated 4 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆55Updated 4 months ago
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year