jkivilin / camellia-simd-aesniLinks
Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instructions) and POWER (with VMX+VSX+crypto instructions)
☆20Updated last week
Alternatives and similar repositories for camellia-simd-aesni
Users that are interested in camellia-simd-aesni are comparing it to the libraries listed below
Sorting:
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Updated 7 years ago
- CRYPTOGAMS distribution repository☆64Updated 3 months ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- A simple MIPS to LLVM IR recompiler with ahead-of-time recompilation support☆45Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 3 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆67Updated last year
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated last week
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 5 years ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆36Updated 8 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- EFI Byte Code Virtual Machine in userspace☆81Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- White-box cryptography based on FAPKC algorithm☆28Updated 10 months ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 6 months ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year
- A tweakable block cipher☆31Updated last year
- llvm with tablegen backend for capstone disassembler☆49Updated 2 months ago
- A fast implementation of the ECMA-182 CRC64 checksum using the CLMUL instruction set☆15Updated 9 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆30Updated 6 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Modify a message to have a desired CRC signature.☆126Updated 4 years ago
- ☆117Updated 2 years ago
- An optimized sample code for SHA256 and SHA512 using C intrinsic☆19Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year