rweather / skinny-cLinks
SKINNY tweakable block cipher
☆20Updated last year
Alternatives and similar repositories for skinny-c
Users that are interested in skinny-c are comparing it to the libraries listed below
Sorting:
- Masked Ascon Software Implementations☆11Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆52Updated last year
- ☆56Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 9 months ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆23Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 8 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- MLKEM implementation optimized for embedded microcontrollers☆25Updated 11 months ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Updated 5 years ago
- An open source project for study S-boxes☆44Updated 2 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆47Updated last month
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆72Updated 2 months ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆83Updated 3 years ago
- Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4☆116Updated 6 years ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆212Updated 6 months ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 11 months ago
- Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.☆9Updated 7 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆36Updated 8 months ago
- ☆11Updated 4 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33Updated 2 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆96Updated last year
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- ☆17Updated 6 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆89Updated last week
- ☆51Updated last year