jedisct1 / zig-rocca-sLinks
An implementation of the ROCCA-S encryption scheme.
☆20Updated 2 months ago
Alternatives and similar repositories for zig-rocca-s
Users that are interested in zig-rocca-s are comparing it to the libraries listed below
Sorting:
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 5 months ago
- ☆25Updated 5 months ago
- Multi-threaded cross-platform HTTP/1.1 web server example in Zig.☆34Updated 4 years ago
- ☆14Updated 6 years ago
- An AES-based 384 bit permutation.☆21Updated 5 months ago
- Blind RSA signatures implementation for Zig.☆19Updated 3 weeks ago
- ☆10Updated 8 months ago
- A binary serialisation format inspired by YAML, MessagePack and nvlists.☆32Updated 5 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- an authenticated, chunked cipher based on BLAKE3☆23Updated 5 months ago
- XKCP-extracted code for KangarooTwelve (K12)☆51Updated last month
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 7 months ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated 5 months ago
- Sphincs+ implementation which uses minimal RAM☆12Updated 2 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- Experimental wasm linker☆43Updated 2 years ago
- distributed revision control system -- historical snapshot☆79Updated 11 years ago
- Turns an Arduino (I used a RedStick from Sparkfun) in a cryptography token, allowing you to encrypt and decrypt messages with an unknown …☆12Updated 8 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 8 years ago
- A tweakable block cipher☆31Updated last year
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 6 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- The BLAKE3 paper: specifications, analysis, and design rationale☆181Updated 3 years ago
- A cache hard password hash/KDF☆48Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Code from the NordicJS talk on how to build GUN!☆19Updated 5 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 10 months ago
- Experimental DNS library implemented in zig☆65Updated last year
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆102Updated last month