jkivilin / camellia-simd-aesniLinks
Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instructions), POWER (with VMX+VSX+crypto instructions) and RISC-V (RVA23+Zvkb+Zvkned).
☆20Updated last week
Alternatives and similar repositories for camellia-simd-aesni
Users that are interested in camellia-simd-aesni are comparing it to the libraries listed below
Sorting:
- A simple MIPS to LLVM IR recompiler with ahead-of-time recompilation support☆45Updated 5 years ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Updated 7 years ago
- CRYPTOGAMS distribution repository☆64Updated 4 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆36Updated 8 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- A fast implementation of the ECMA-182 CRC64 checksum using the CLMUL instruction set☆15Updated 9 years ago
- Repository for the current status of the LESS submission☆13Updated last week
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- Support of Nvidia Falcon processors for Ghidra☆73Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆68Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Sled System Emulator☆28Updated 2 months ago
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆52Updated last year
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- Optimized Binary GCD for Modular Inversion☆49Updated 5 years ago
- A simple library focusing on demangling symbols for different programing languages☆48Updated 5 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆16Updated last month
- ☆16Updated 5 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated this week
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- A tweakable block cipher☆31Updated last year