jkivilin / camellia-simd-aesniLinks
Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instructions), POWER (with VMX+VSX+crypto instructions) and RISC-V (RVA23+Zvkb+Zvkned).
☆20Updated 3 weeks ago
Alternatives and similar repositories for camellia-simd-aesni
Users that are interested in camellia-simd-aesni are comparing it to the libraries listed below
Sorting:
- A simple MIPS to LLVM IR recompiler with ahead-of-time recompilation support☆45Updated 6 years ago
- CRYPTOGAMS distribution repository☆65Updated 4 months ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆121Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Updated 5 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Support of Nvidia Falcon processors for Ghidra☆74Updated last year
- White-box cryptography based on FAPKC algorithm☆28Updated last month
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆36Updated 9 years ago
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Updated 3 weeks ago
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated 10 months ago
- ☆118Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆73Updated last year
- C++ STL for speed and cryptanalytic application☆11Updated last month
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- PSP emulator☆93Updated 4 years ago
- ☆16Updated 4 years ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆35Updated 2 weeks ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- The fastest MD5 implementation using x86 assembly☆149Updated 10 months ago
- Modify a message to have a desired CRC signature.☆126Updated 4 years ago