rweather / ascon-suiteLinks
Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆45Updated 7 months ago
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 2 weeks ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated 2 weeks ago
- A small C library for the XChaCha20 stream cipher☆36Updated 2 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆213Updated 5 months ago
- A tiny library to properly encrypt IP addresses.☆18Updated last month
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆12Updated this week
- Simple constant-time AES implementation☆121Updated 5 months ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆129Updated 2 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 8 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- Small portable HMAC in C☆75Updated 8 months ago
- ☆36Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- ☆81Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- A compact portable X25519 + Ed25519 implementation☆41Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 3 years ago
- A tweakable block cipher☆31Updated last year
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆19Updated 2 years ago
- Highly efficient implementation of elliptic curve 25519☆155Updated 2 years ago
- AES Galois Extended Mode☆14Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 6 months ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆14Updated 4 years ago
- ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)☆18Updated 4 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year