rbCabral / SHA-3Links
Implementation of the SHA-3 family using AVX/AVX2 instructions.
☆14Updated 7 years ago
Alternatives and similar repositories for SHA-3
Users that are interested in SHA-3 are comparing it to the libraries listed below
Sorting:
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 8 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Updated 5 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- fft impl for ff::Field☆17Updated last year
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 10 years ago
- C crypto library☆24Updated 2 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 4 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Updated 2 months ago
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Banquet implementation☆14Updated 3 years ago
- ☆19Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Updated 3 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 8 years ago
- ☆19Updated 2 months ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- WIP: code generation package in Go -- used by gnark, goff and gurvy☆14Updated 3 weeks ago
- A programming language to write bitsliced ciphers☆59Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- Notary: A Device for Secure Transaction Approval 📟☆28Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 5 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆65Updated last year
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- ☆12Updated 4 years ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Updated 4 years ago