rweather / lightweight-cryptoView external linksLinks
NIST Lightweight Cryptography Primitives
☆54Jun 10, 2022Updated 3 years ago
Alternatives and similar repositories for lightweight-crypto
Users that are interested in lightweight-crypto are comparing it to the libraries listed below
Sorting:
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- Lightweight cryptography☆14Nov 7, 2022Updated 3 years ago
- Reference code for the Simeck family of block ciphers☆15Jun 21, 2015Updated 10 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆12May 7, 2021Updated 4 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 9 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Feb 22, 2023Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Jan 8, 2026Updated last month
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- AVX-2 vectorised 8-bit positional popcount for Go☆23Aug 28, 2020Updated 5 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- A simple implementation of the Huffman Coding in C☆10Oct 8, 2016Updated 9 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 7 months ago
- ☆11Jan 24, 2019Updated 7 years ago