jedisct1 / zig-hiae
HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.
☆15Updated 2 months ago
Alternatives and similar repositories for zig-hiae:
Users that are interested in zig-hiae are comparing it to the libraries listed below
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 4 months ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆16Updated 2 weeks ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 2 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated last month
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆86Updated 2 weeks ago
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated last month
- ☆11Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- Compress sets of integers efficiently☆21Updated 2 weeks ago
- An experimental authenticated cipher.☆11Updated 9 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated last month
- A tiny library to properly encrypt IP addresses.☆17Updated last week
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated 3 weeks ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- A cache hard password hash/KDF☆47Updated last year
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆48Updated last year
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 6 years ago
- Fork of BoringSSL that adds hybrid post-quantum key exchange☆24Updated 7 months ago
- A collection of high-performance crypto implementations.☆51Updated last week
- Rust native library for TPM 2.0 operations. Heavily work in progress.☆13Updated 2 years ago
- Deterministic key generation for Go.☆18Updated 9 months ago
- xxhash-64 in 20 lines☆23Updated 10 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆43Updated 5 months ago
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆76Updated 2 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- A tweakable block cipher☆31Updated 11 months ago
- an authenticated, chunked cipher based on BLAKE3☆23Updated 2 months ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆33Updated 3 months ago