rweather / skinny-c
SKINNY tweakable block cipher
☆19Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for skinny-c
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- AVX implementation of the Skinny block cipher☆11Updated 2 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆25Updated last year
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- Fast constant-time AES implementations on 32-bit architectures☆61Updated 3 weeks ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Updated 7 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆15Updated 4 years ago
- ☆16Updated 3 weeks ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- High-order countermeasures for AES and DES☆25Updated 3 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 2 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆9Updated last year
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆33Updated last year
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆20Updated 7 years ago
- ☆32Updated 2 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆27Updated 3 months ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆29Updated last year
- ☆16Updated 3 years ago
- ☆10Updated 3 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆34Updated 3 years ago
- ☆52Updated 4 months ago
- Program for finding low gate count implementations of S-boxes.☆36Updated 2 weeks ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- A new heuristic to optimize implementations of linear matrices☆13Updated last year
- MLKEM implementation optimized for embedded microcontrollers☆14Updated 2 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Side Channel Attack: Differential Power Analysis (DPA) on AES encryption algorithm to deduce secret keys☆11Updated 6 years ago
- An open source project for study S-boxes☆38Updated 2 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆16Updated 3 years ago