rweather / ascon-suiteLinks
Suite of symmetric cryptography primitives built on top of the ASCON permutation
☆46Updated last year
Alternatives and similar repositories for ascon-suite
Users that are interested in ascon-suite are comparing it to the libraries listed below
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- ☆13Updated 2 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆261Updated 4 months ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated 2 weeks ago
- A small C library for the XChaCha20 stream cipher☆38Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- AES Galois Extended Mode☆19Updated last year
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32, ARM64 and LoongArch64 assembly☆134Updated last month
- ☆23Updated 6 months ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Updated 3 weeks ago
- Small portable HMAC in C☆83Updated last year
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- ☆38Updated 4 years ago
- The public release of LeftoverLocals code☆72Updated 2 years ago
- A compact portable X25519 + Ed25519 implementation☆52Updated 5 months ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆18Updated 2 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Go Trusted Execution Environment (TEE)☆147Updated 5 months ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆18Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆35Updated 2 weeks ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 7 months ago
- Simple constant-time AES implementation☆121Updated last year
- Encryption Algorithm Combined☆30Updated 9 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Updated 2 years ago