rweather / skinny-cLinks
SKINNY tweakable block cipher
☆20Updated last year
Alternatives and similar repositories for skinny-c
Users that are interested in skinny-c are comparing it to the libraries listed below
Sorting:
- A bitsliced implementation of ECB and CTR AES☆51Updated 10 months ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- AVX implementation of the Skinny block cipher☆11Updated 3 years ago
- Masked Ascon Software Implementations☆11Updated 3 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Updated 7 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- ☆55Updated 11 months ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- MLKEM implementation optimized for embedded microcontrollers☆22Updated 9 months ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 3 years ago
- ☆18Updated 4 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆12Updated last year
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆30Updated 2 months ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆51Updated last year
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- ☆48Updated last year
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 4 months ago
- Implementation of authenticated encryption GCM. The block cipher used is AES-128.☆27Updated 6 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆15Updated 5 years ago
- ☆10Updated 4 years ago
- ☆9Updated 5 years ago
- Reference implementations of the GIMLI permutation☆15Updated 7 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆35Updated 6 months ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆22Updated 8 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26Updated 2 years ago
- Implementation of Matsui's algorithm for finding the minimum number of active S-boxes.☆9Updated 7 years ago