jedisct1 / zig-rocca-sLinks
An implementation of the ROCCA-S encryption scheme.
☆20Updated last month
Alternatives and similar repositories for zig-rocca-s
Users that are interested in zig-rocca-s are comparing it to the libraries listed below
Sorting:
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 4 months ago
- An AES-based 384 bit permutation.☆21Updated 4 months ago
- ☆25Updated 3 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 5 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Sphincs+ implementation which uses minimal RAM☆11Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A collection of high-performance crypto implementations.☆52Updated 4 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 6 months ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- an authenticated, chunked cipher based on BLAKE3☆23Updated 3 months ago
- Multi-threaded cross-platform HTTP/1.1 web server example in Zig.☆34Updated 4 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- ☆13Updated 4 years ago
- Constant-time WebAssembly☆20Updated 3 years ago
- Blind RSA signatures implementation for Zig.☆19Updated 11 months ago
- Finalists to the NIST lightweight cryptography competition☆38Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- C crypto library☆24Updated 2 years ago
- ☆19Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆94Updated this week
- ☆19Updated 2 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆11Updated 10 months ago