SKINNY tweakable block cipher
☆22Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for skinny-c
Users that are interested in skinny-c are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AVX implementation of the Skinny block cipher☆11Apr 24, 2022Updated 3 years ago
- ☆10Apr 18, 2017Updated 8 years ago
- Efficient constant-time implementations of SKINNY-128☆12Dec 24, 2024Updated last year
- Code for the paper "Efficient MILP modelings for Sboxes and Linear Layers of SPN ciphers", ToSC 2020.☆15Nov 30, 2020Updated 5 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Jan 26, 2026Updated 2 months ago
- ☆16Feb 10, 2021Updated 5 years ago
- This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do d…☆17Jul 18, 2019Updated 6 years ago
- Hardware designs for fault detection☆21Apr 13, 2020Updated 5 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks☆12Nov 12, 2024Updated last year
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 10 months ago
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- MILP-based Differential Attack on Round-Reduced GIFT☆19Dec 9, 2018Updated 7 years ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆13Apr 11, 2022Updated 3 years ago
- OS X kernel extension for reading MSRs (Model Specific Registers)☆12Sep 27, 2016Updated 9 years ago
- QARMA block cipher in C☆31Sep 10, 2022Updated 3 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- Encoding different problems into Boolean satisfiability☆12Sep 29, 2022Updated 3 years ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- ☆11May 21, 2020Updated 5 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- A simple UDP load balancer in Golang. Works with IPsec.☆12Nov 23, 2017Updated 8 years ago
- Timing Diagram Stencil for Microsoft Visio 2010 (and other versions)☆12Aug 13, 2016Updated 9 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Big unsigned integers (128, 256, 384, 512 or more bits), big (signed) integers and big decimal numbers.☆12Mar 4, 2024Updated 2 years ago
- ☆17Nov 20, 2017Updated 8 years ago
- 基于Android系统的文件加解密☆16Jan 3, 2017Updated 9 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- A bitsliced implementation of ECB and CTR AES☆54Aug 1, 2024Updated last year
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago