rweather / ascon-suiteLinks
Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆46Updated last year
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below
Sorting:
- ☆13Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆256Updated 4 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 10 months ago
- A small C library for the XChaCha20 stream cipher☆38Updated 2 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated this week
- ☆22Updated 5 months ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 6 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated this week
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32, ARM64 and LoongArch64 assembly☆131Updated last week
- Small portable HMAC in C☆83Updated last year
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆16Updated 4 years ago
- Toolkit for creating cryptographic figures and videos.☆35Updated last year
- Highly efficient implementation of elliptic curve 25519☆157Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Simple constant-time AES implementation☆120Updated 11 months ago
- A compact portable X25519 + Ed25519 implementation☆51Updated 4 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆30Updated 6 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆18Updated last month
- ChaCha20 stream cipher implemented in C☆79Updated 11 months ago
- ☆38Updated 4 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆24Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- QARMA block cipher in C☆31Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆54Updated last year