Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4
☆132Feb 27, 2019Updated 7 years ago
Alternatives and similar repositories for sm4ni
Users that are interested in sm4ni are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated 4 months ago
- [HISTORICAL] A Lightweight (RISC-V) ISA Extension for AES and SM4☆38Feb 4, 2021Updated 5 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- Fast constant-time AES implementations on 32-bit architectures☆71Oct 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 8 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- IETF Internet-Draft (I-D) of Chinese cipher suites in TLSv1.3 and related documentation.☆27Mar 9, 2021Updated 5 years ago
- Implementation of the proposed Russian block cipher standard, Kuznechik ("Grasshopper"). 128-bit block size, 256-bit key.☆61Jan 29, 2015Updated 11 years ago
- Verilog Implementation of SM4 s-box☆22Jun 24, 2019Updated 6 years ago
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A programming language to write bitsliced ciphers☆61Sep 4, 2024Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- 1测试TLS1.2报文修改; 2测试OpenSSL1.1.1提供的SM4对 称加密算法;☆23Jun 11, 2019Updated 6 years ago
- Standard curve database.☆126Apr 2, 2026Updated last month
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Feb 20, 2021Updated 5 years ago
- Introduction about SIMD instructions. Mainly about SSE and AVX.☆13Mar 13, 2018Updated 8 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ruby bindings for the Botan cryptographic library☆13Feb 4, 2020Updated 6 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- Intel® Cryptography Primitives Library is a secure, fast and lightweight library of building blocks for cryptography, highly-optimized fo…☆379Apr 30, 2026Updated last week
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Nov 12, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆22Jun 21, 2019Updated 6 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- 国家商用加密算法 SMx(SM2,SM3,SM4)☆404Feb 11, 2023Updated 3 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 6 years ago
- Lightweight cryptography☆15Nov 7, 2022Updated 3 years ago
- eXtended Keccak Code Package☆649Dec 19, 2025Updated 4 months ago
- Intel(R) Multi-Buffer Crypto for IPSec☆333Apr 27, 2026Updated last week