jedisct1 / zig-aes-gem
AES-GEM (AES Galois Extended Mode) implementation.
☆13Updated 2 months ago
Alternatives and similar repositories for zig-aes-gem
Users that are interested in zig-aes-gem are comparing it to the libraries listed below
Sorting:
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- ☆13Updated 2 years ago
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated 2 weeks ago
- A DNS library for Rust.☆23Updated last month
- A tiny library to properly encrypt IP addresses.☆17Updated last week
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆16Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 2 months ago
- A collection of high-performance crypto implementations.☆51Updated last month
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated 2 months ago
- ☆11Updated last year
- ☆19Updated 4 years ago
- AES Galois Extended Mode☆14Updated last year
- ☆20Updated 8 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- ☆24Updated 8 months ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated this week
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆27Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- A tweakable block cipher☆31Updated last year
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- Scipio is a thread-per-core framework that aims to make the task of writing highly parallel asynchronous application in a thread-per-core…☆9Updated last year
- Specification for the AEGIS family of authenticated encryption algorithms.☆16Updated last month
- Compress sets of integers efficiently☆21Updated last month
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆43Updated 6 months ago
- A sample PoC for container-aware exec events for osquery☆24Updated last year