rweather / ascon-suiteLinks
Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆45Updated last year
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- A small C library for the XChaCha20 stream cipher☆39Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 4 months ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆252Updated 2 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 8 months ago
- The smallest readable implementation of AES algorithms in C☆58Updated last month
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 3 weeks ago
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated last month
- Small portable HMAC in C☆79Updated last year
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆18Updated last week
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆132Updated last month
- A compact portable X25519 + Ed25519 implementation☆49Updated 3 months ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 4 months ago
- ☆36Updated 3 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- Toolkit for creating cryptographic figures and videos.☆34Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Simple constant-time AES implementation☆120Updated 9 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- ☆22Updated 4 months ago
- Highly efficient implementation of elliptic curve 25519☆157Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- The public release of LeftoverLocals code☆70Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 11 months ago
- OpenSSL engine for use with SymCrypt cryptographic library☆76Updated last week
- rpv-web is a browser based frontend for the rpv library☆25Updated 6 months ago
- The Proof of concept for abusing SeDebugPrivilege (Privilege Escalation in Windows)☆17Updated last year
- ☆16Updated 5 years ago