poojagarg / ECCLinks
Implementation of Elliptic Curve Cryptography in C++
☆42Updated 10 years ago
Alternatives and similar repositories for ECC
Users that are interested in ECC are comparing it to the libraries listed below
Sorting:
- Source code for 'Cryptography in C and C++' by Michael Welschenbach☆79Updated 4 years ago
- Library for elliptic curves cryptography☆263Updated 2 years ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆29Updated 6 years ago
- SHA-1, SHA-2, SHA-3, SM3, SM4, DES, AES implemented in C++☆43Updated 10 years ago
- C library for ECC-SM2 public encrypt☆10Updated 9 years ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆128Updated 6 years ago
- ☆316Updated 2 months ago
- C++ library for Fast Fourier Transforms in finite fields☆100Updated 4 years ago
- Simple and secure ECC and ECDSA☆61Updated 3 years ago
- pollard's p-1 algorithm on CUDA☆28Updated 11 years ago
- C++ library for Finite Fields and Elliptic Curves☆167Updated 4 years ago
- ☆34Updated last year
- C++ implementation of Data Encryption Standard (DES, 3DES) (ECB, CBC)☆120Updated last year
- KeccakTools is a set of C++ classes that can help analyze the Keccak sponge function family, designed by Guido Bertoni, Joan Daemen, Mich…☆185Updated 7 years ago
- 基于Miracl的国密算法SM9实现☆76Updated 2 years ago
- DES algorithm implementation in C☆79Updated 5 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Updated 10 years ago
- Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)☆83Updated last year
- masked, bit-sliced AES-128 demo code☆14Updated last year
- Implementations of some lightweight block ciphers in C☆19Updated 7 years ago
- GM/T serial standards implementations☆18Updated 3 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Updated 3 years ago
- C implementation of the SHA-3 and Keccak with Init/Update/Finalize hashing API (NIST FIPS 202/Etherium)☆181Updated last year
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Updated 3 years ago
- A C++ library for creation and manipulation of Merkle trees☆82Updated last year
- Tool for generating Elliptic curve domain parameters☆130Updated last month
- Lattice-Based Post-Quantum Authenticated Key Exchange☆19Updated 8 years ago
- Source code developed in the BLOC project☆20Updated 6 years ago
- Software of the NIST Post-Quantum submission NewHope☆45Updated 5 years ago