jkivilin / camellia-simd-aesni
Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instructions) and POWER (with VMX+VSX+crypto instructions)
☆18Updated 2 years ago
Alternatives and similar repositories for camellia-simd-aesni
Users that are interested in camellia-simd-aesni are comparing it to the libraries listed below
Sorting:
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- Libfinite - a tiny bignum library for arithmetic over (parts of) Z/nZ.☆10Updated 6 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 9 months ago
- llvm with tablegen backend for capstone disassembler☆48Updated this week
- CRYPTOGAMS distribution repository☆56Updated 6 months ago
- Free, zlib licensed ZX0 decompressor for the x86☆18Updated 3 years ago
- A simple MIPS to LLVM IR recompiler with ahead-of-time recompilation support☆44Updated 5 years ago
- ☆15Updated 2 years ago
- Demo projects using virt86☆14Updated 5 years ago
- betrusted.io main SoC design☆12Updated 5 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆14Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated last month
- Dump GNU IFUNC implementation offsets from libc☆11Updated 2 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated this week
- Example of LZ4 compression with optimal parsing using BriefLZ algorithms☆27Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆10Updated 6 years ago
- ☆45Updated 6 years ago
- Linux Kernel Debugger☆19Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated last month
- AVX2 Chacha implementation☆16Updated 11 years ago
- Tiny LZW implementations in assembly☆14Updated last year
- Pentium II microcode (dis)assembler and (de)scrambler☆20Updated 4 years ago
- A tiny library to properly encrypt IP addresses.☆17Updated 2 weeks ago
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆52Updated last year