☆86Nov 18, 2025Updated 5 months ago
Alternatives and similar repositories for pyascon
Users that are interested in pyascon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ascon - Lightweight Authenticated Encryption & Hashing☆280Jan 28, 2026Updated 3 months ago
- Hardware Design of Ascon☆43Apr 13, 2026Updated 3 weeks ago
- A collection of Ascon implementations & documents (as submodules)☆56Mar 30, 2026Updated last month
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆35Aug 29, 2023Updated 2 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 4 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Rust implemention of Ascon☆21Mar 23, 2026Updated last month
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13Mar 3, 2021Updated 5 years ago
- ☆11May 21, 2020Updated 5 years ago
- ☆17May 26, 2020Updated 5 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆41Nov 17, 2024Updated last year
- ☆12Apr 10, 2026Updated 3 weeks ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- Security Estimation Scripts for Kyber and Dilithium☆54Mar 16, 2021Updated 5 years ago
- ☆55Jun 20, 2024Updated last year
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated last year
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Apr 8, 2026Updated 3 weeks ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆78Updated this week
- A portable library implementing NIST SP 800-90A DRBGs☆18Nov 25, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21Oct 3, 2021Updated 4 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 3 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year