Efficient implementation of maksed AES on ARM NEON
☆23Jun 6, 2017Updated 8 years ago
Alternatives and similar repositories for AES-ARM-NEON
Users that are interested in AES-ARM-NEON are comparing it to the libraries listed below
Sorting:
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- A programming language to write bitsliced ciphers☆59Sep 4, 2024Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated 2 weeks ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- Introduction about SIMD instructions. Mainly about SSE and AVX.☆13Mar 13, 2018Updated 7 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Rust native library for TPM 2.0 operations. Heavily work in progress.☆13Dec 5, 2022Updated 3 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 5 years ago
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago
- Short proof-of-concepts for STM32 boards using a very minimal interface☆18Jan 29, 2018Updated 8 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated 2 months ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆46Feb 16, 2026Updated 2 weeks ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆18Feb 22, 2021Updated 5 years ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆128Feb 27, 2019Updated 7 years ago
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆53Apr 5, 2024Updated last year