SKINNY tweakable block cipher
☆22Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for skinny-c
Users that are interested in skinny-c are comparing it to the libraries listed below
Sorting:
- ☆10Apr 18, 2017Updated 8 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Jan 26, 2026Updated last month
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Hardware designs for fault detection☆19Apr 13, 2020Updated 5 years ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- ☆16Feb 10, 2021Updated 5 years ago
- This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do d…☆17Jul 18, 2019Updated 6 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- FIPS 202 compliant SHA-3 core in Verilog☆23Oct 8, 2020Updated 5 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- Python bindings to the Crypto++ library☆50Jul 29, 2023Updated 2 years ago
- An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks☆12Nov 12, 2024Updated last year
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- Bulk generate eggs in PKHeX.☆10Sep 8, 2025Updated 6 months ago
- ☆38Dec 16, 2021Updated 4 years ago
- high performance AES implementations optimized for cortex-m microcontrollers☆44Dec 29, 2025Updated 2 months ago
- How to create a Minecraft server using WireGuard & PiVPN!☆14Feb 24, 2025Updated last year
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- A collection python tools used to create gguf files and upload to huggingface☆17Updated this week
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 3 weeks ago
- ☆12Jan 13, 2022Updated 4 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- Installation program to add Jacksum (CLI) and HashGarten (GUI) to Microsoft Windows. It also adds functions to the Send To menu which is …☆12Dec 1, 2024Updated last year
- ☆11Nov 27, 2024Updated last year
- ☆11Jan 10, 2024Updated 2 years ago