HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents
☆18Apr 4, 2018Updated 7 years ago
Alternatives and similar repositories for hila5
Users that are interested in hila5 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Ruby bindings for the Botan cryptographic library☆13Feb 4, 2020Updated 6 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆20Feb 22, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- The project page of ZeroWallet☆19Jul 19, 2019Updated 6 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- Official ISO/TC 211 Ontologies (input to def.iotc211.org)☆10Mar 9, 2026Updated 2 weeks ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- Rababa, the diacritization library for Arabic and Hebrew (Abjad scripts in general)☆13May 1, 2025Updated 10 months ago
- Installer for Microsoft Vista TrueType Fonts (TTF) aka Microsoft’s ClearType fonts on macOS and Ubuntu☆10Oct 17, 2024Updated last year
- Terraform module for a complete GitLab instance (and associated services) on AWS ECS☆15Jun 21, 2019Updated 6 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- Stella Polaris - Independent sub Tor network☆12Jul 31, 2017Updated 8 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- QubesOS dom0 automation in Python☆13Aug 3, 2017Updated 8 years ago
- AsciiRFC: an AsciiDoc/asciidoctor backend to produce RFC XML v3 (RFC 7991) and v2 (RFC 7749)☆15Dec 23, 2019Updated 6 years ago
- Plurimath Ruby gem☆21Updated this week
- Practical Implementation of the Maurer Reduction☆10Jul 13, 2023Updated 2 years ago
- Metanorma processor for ISO standards☆18Updated this week
- A fork of attr_encrypted, repurposed to handle data masking in test databases☆17Dec 22, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cryptode: managing your VPN connections (CLI for Linux and macOS)☆17May 14, 2020Updated 5 years ago
- An implementation of Publicly Verifiably Secret Sharing (PVSS) in Swift.☆13Nov 8, 2017Updated 8 years ago
- ☆26Mar 9, 2023Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated last month
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆29Jun 7, 2024Updated last year
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- XML metadata and downloads for NIST Technical Series Publications☆27Mar 10, 2026Updated 2 weeks ago
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Feb 2, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Sending and receiving protobuf using NIO socket☆14Jan 24, 2026Updated 2 months ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆130Feb 27, 2019Updated 7 years ago
- Initialization system in Rust☆31Oct 13, 2021Updated 4 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Tool for semantic querying of Rust code.☆13Jan 19, 2020Updated 6 years ago
- Elliptic Curve Cryptography Compiler: an incomplete experiment in code-generation for elliptic curves in Go☆52Dec 15, 2020Updated 5 years ago