mjosaarinen / sm4niView external linksLinks
Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4
☆127Feb 27, 2019Updated 6 years ago
Alternatives and similar repositories for sm4ni
Users that are interested in sm4ni are comparing it to the libraries listed below
Sorting:
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆37Feb 4, 2021Updated 5 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 7 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- ☆30Jan 3, 2026Updated last month
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A programming language to write bitsliced ciphers☆59Sep 4, 2024Updated last year
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- Implementation of the proposed Russian block cipher standard, Kuznechik ("Grasshopper"). 128-bit block size, 256-bit key.☆61Jan 29, 2015Updated 11 years ago
- Support of e2k architecture for LuaJIT.☆11Jan 30, 2026Updated 2 weeks ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆39Mar 18, 2025Updated 10 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Verilog Implementation of SM4 s-box☆22Jun 24, 2019Updated 6 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- Standard curve database.☆121Dec 3, 2025Updated 2 months ago
- Lightweight cryptography☆14Nov 7, 2022Updated 3 years ago
- Library for reading and writing dex files☆24Updated this week
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42May 23, 2025Updated 8 months ago
- 1测试TLS1.2报文修改; 2测试OpenSSL1.1.1提供的SM4对称加密算法;☆23Jun 11, 2019Updated 6 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- 🤖 A telegram bot to monitor Tsinghua web learning and push new updates to user in Telegram.☆12Jul 22, 2025Updated 6 months ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- AES encryption function using Intel, ARMv8 and Power8 intrinsics☆52Apr 5, 2024Updated last year
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago