Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆47Nov 18, 2024Updated last year
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Ascon implementations & documents (as submodules)☆56Mar 30, 2026Updated last month
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆291Jan 28, 2026Updated 3 months ago
- Finalists to the NIST lightweight cryptography competition☆41Jun 29, 2022Updated 3 years ago
- ☆87Nov 18, 2025Updated 6 months ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆35Aug 29, 2023Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 6 months ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Decree Fiat Shamir Library☆12Mar 27, 2024Updated 2 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆14Feb 9, 2026Updated 3 months ago
- ☆33Sep 12, 2024Updated last year
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 9 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 3 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆17May 11, 2022Updated 4 years ago
- ☆10Jan 29, 2025Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆60Jan 29, 2015Updated 11 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated last year
- A Rust library for the Groth-Sahai non-interactive witness-indistinguishable and zero-knowledge proof system☆14May 1, 2025Updated last year
- ☆12Jan 13, 2022Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 3 months ago
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 9 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- ☆24May 14, 2025Updated last year
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Mar 13, 2026Updated 2 months ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆44Jan 15, 2026Updated 4 months ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 4 months ago
- ☆55Jun 20, 2024Updated last year