poojagarg / ECC
Implementation of Elliptic Curve Cryptography in C++
☆38Updated 9 years ago
Alternatives and similar repositories for ECC:
Users that are interested in ECC are comparing it to the libraries listed below
- SHA-1, SHA-2, SHA-3, SM3, SM4, DES, AES implemented in C++☆43Updated 9 years ago
- Simple and secure ECC and ECDSA☆59Updated 2 years ago
- C++ library for Fast Fourier Transforms in finite fields☆95Updated 3 years ago
- Implementations of some lightweight block ciphers in C☆19Updated 7 years ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆114Updated 6 years ago
- C implementation of the SHA-3 and Keccak with Init/Update/Finalize hashing API (NIST FIPS 202/Etherium)☆175Updated 6 months ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Updated 9 years ago
- Fast software implementation in C of the FIPS 180-2 hash algorithms SHA-224, SHA-256, SHA-384 and SHA-512☆55Updated 10 months ago
- masked, bit-sliced AES-128 demo code☆13Updated 2 months ago
- Montgomery multiply☆12Updated 10 years ago
- ☆34Updated last year
- GM/T serial standards implementations☆18Updated 3 years ago
- Library for elliptic curves cryptography☆261Updated 2 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Trustzone vexpress helloworld example☆18Updated 8 years ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆27Updated 6 years ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆76Updated 5 years ago
- Highly efficient implementation of elliptic curve 25519☆153Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆49Updated 8 months ago
- C++ library for Finite Fields and Elliptic Curves☆155Updated 3 years ago
- C++ implementation of Tink☆75Updated this week
- This is an implementation of the Elliptic-Curve Diffie-Hellman Cryptographic Algorithm.☆16Updated 3 years ago
- Tool for generating Elliptic curve domain parameters☆117Updated this week
- a whiteboxed DES implementation based on Chow et al paper☆30Updated 10 years ago
- ☆282Updated last year
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- A C++ library for creation and manipulation of Merkle trees☆74Updated 6 months ago
- 基于Miracl的国密算法SM9实现☆73Updated last year
- ☆49Updated 7 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago