☆84Nov 18, 2025Updated 4 months ago
Alternatives and similar repositories for pyascon
Users that are interested in pyascon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ascon - Lightweight Authenticated Encryption & Hashing☆276Jan 28, 2026Updated last month
- A collection of Ascon implementations & documents (as submodules)☆54Dec 3, 2025Updated 3 months ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 3 years ago
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- DenseQMC: A bit-slice implementation of the Quine-McCluskey algorithm☆16Dec 30, 2025Updated 2 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- Rust implemention of Ascon☆20Feb 9, 2026Updated last month
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 7 months ago
- ☆13Mar 3, 2021Updated 5 years ago
- ☆11May 21, 2020Updated 5 years ago
- Security Estimation Scripts for Kyber and Dilithium☆54Mar 16, 2021Updated 5 years ago
- ☆17May 26, 2020Updated 5 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆40Nov 17, 2024Updated last year
- ☆13Apr 24, 2024Updated last year
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- ☆55Jun 20, 2024Updated last year
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- OP-TEE port for the Raspberry Pi 4 platform☆22Nov 18, 2025Updated 4 months ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated 11 months ago
- A quick version of the keeloq crypto system written in python.☆11Apr 24, 2015Updated 10 years ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Feb 3, 2026Updated last month
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- elliptic-curve cryptography☆31Oct 8, 2023Updated 2 years ago
- ETSI TS 103 097 v1.2.1 - v.1.2.5 library (outdated)☆12Mar 21, 2018Updated 8 years ago
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆77Updated this week
- A portable library implementing NIST SP 800-90A DRBGs☆18Nov 25, 2025Updated 3 months ago
- ☆21Oct 3, 2021Updated 4 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Open Cryptanalysis Platform☆13Updated this week
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago