Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆46Nov 18, 2024Updated last year
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Ascon implementations & documents (as submodules)☆54Dec 3, 2025Updated 3 months ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆276Jan 28, 2026Updated 2 months ago
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆34Aug 29, 2023Updated 2 years ago
- ☆84Nov 18, 2025Updated 4 months ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 4 months ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- ☆31Sep 12, 2024Updated last year
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Opinionated TUI RSS reader for Linux and Mac☆38Mar 21, 2026Updated last week
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 7 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆59Jan 29, 2015Updated 11 years ago
- ☆10Jan 29, 2025Updated last year
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Dream AM/DRM Receiver☆23Feb 6, 2023Updated 3 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- A tool for compiling and linking Zig libraries to Rust projects.☆14Feb 2, 2023Updated 3 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- ☆25May 14, 2025Updated 10 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Mar 13, 2026Updated 2 weeks ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated 2 months ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- ☆55Jun 20, 2024Updated last year