rweather / skinny-c
SKINNY tweakable block cipher
☆20Updated last year
Alternatives and similar repositories for skinny-c:
Users that are interested in skinny-c are comparing it to the libraries listed below
- A bitsliced implementation of ECB and CTR AES☆50Updated 8 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- MLKEM implementation optimized for embedded microcontrollers☆19Updated 8 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆11Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆18Updated 4 years ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- High-order countermeasures for AES and DES☆25Updated 8 months ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- ☆55Updated 10 months ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated last month
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- ☆32Updated 3 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆55Updated this week
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆22Updated 8 years ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Security Estimation Scripts for Kyber and Dilithium☆37Updated 4 years ago
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 2 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆44Updated 2 months ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.☆9Updated 7 years ago
- ☆48Updated 11 months ago