nsacyber / simon-speck-supercopLinks
Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber
☆46Updated 6 years ago
Alternatives and similar repositories for simon-speck-supercop
Users that are interested in simon-speck-supercop are comparing it to the libraries listed below
Sorting:
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆19Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- ☆12Updated 2 years ago
- Some scripts to create a reproducible build for grsecurity☆30Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated 3 weeks ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- An implementation of the Skein hash function for ARMv7 with NEON☆14Updated 13 years ago
- ☆17Updated 10 years ago
- ☆35Updated 3 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago