rbCabral / SHA-3Links
Implementation of the SHA-3 family using AVX/AVX2 instructions.
☆14Updated 7 years ago
Alternatives and similar repositories for SHA-3
Users that are interested in SHA-3 are comparing it to the libraries listed below
Sorting:
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Updated 5 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 7 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- fft impl for ff::Field☆17Updated last year
- Optimized Binary GCD for Modular Inversion☆49Updated 5 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 10 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆25Updated last month
- C crypto library☆24Updated 2 years ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- A programming language to write bitsliced ciphers☆59Updated last year
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Circuits for functions of interest to cryptography☆28Updated last year
- ☆13Updated 7 years ago
- CRYPTOGAMS distribution repository☆64Updated 4 months ago
- ☆19Updated last month
- Banquet implementation☆14Updated 3 years ago
- WIP: code generation package in Go -- used by gnark, goff and gurvy☆14Updated last week
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 4 years ago
- Comparison of leading error-correcting code implementations☆12Updated 3 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Updated 3 years ago
- ☆19Updated 5 years ago
- Fast constant-time AES implementations on 32-bit architectures☆68Updated last year
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated 3 weeks ago
- Intel assembly finite field library generator☆13Updated 2 years ago