openluopworld / aes_gcmView external linksLinks
Implementation of authenticated encryption GCM. The block cipher used is AES-128.
☆29Mar 19, 2019Updated 6 years ago
Alternatives and similar repositories for aes_gcm
Users that are interested in aes_gcm are comparing it to the libraries listed below
Sorting:
- Standalone AES-GCM library (pulled out of mbed TLS)☆34Apr 28, 2016Updated 9 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Nov 21, 2016Updated 9 years ago
- Dr. Brian Gladman's XTS-AES implementation☆19Jun 8, 2020Updated 5 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆20Oct 16, 2021Updated 4 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Jan 17, 2022Updated 4 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- ☆28Mar 4, 2025Updated 11 months ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 2 years ago
- 計算機結構 -- Nand2tetris Part I (金門大學 / 資訊工程系 106 上學期 )☆12Dec 21, 2017Updated 8 years ago
- A risc-v simulator based on SystrmC☆14Jan 7, 2022Updated 4 years ago
- Simple implementation of SHA1 in C☆12Apr 26, 2017Updated 8 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- A Fix-pointed Rudimentary CNN Convolution Accelerator☆16Oct 7, 2020Updated 5 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆11Jun 11, 2021Updated 4 years ago
- Rocky 8.6 koji项目解析☆11Jul 26, 2023Updated 2 years ago
- A generic implementation of a Nested Monte Carlo Search for single player games☆11Jun 8, 2016Updated 9 years ago
- Implementation of the SPDM protocol☆13Feb 6, 2026Updated last week
- OCEAN – Open-source CXL Emulation at Hyperscale Architecture and Networking.☆20Updated this week
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago
- Add-ons to FreeRTOS☆13Oct 8, 2014Updated 11 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- ☆13Aug 7, 2017Updated 8 years ago
- ☆13Nov 4, 2014Updated 11 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- 这里存放的是我们团队 做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- AES Key Wrap and AES Key Wrap with Padding routines☆11Dec 2, 2024Updated last year
- ☆11Nov 18, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 4 months ago
- ☆11Dec 31, 2019Updated 6 years ago
- Computer Architecture UIUC SP 2018☆14May 4, 2018Updated 7 years ago
- An incomplete arbitrary-precision integer arithmetic library☆14Feb 24, 2022Updated 3 years ago
- ☆13May 19, 2015Updated 10 years ago