A permissively licensed, low-level, high-performance cryptographic hash library for hackers.
☆27Jun 6, 2025Updated 9 months ago
Alternatives and similar repositories for llhash
Users that are interested in llhash are comparing it to the libraries listed below
Sorting:
- go implementation of anchorhash☆15Nov 19, 2020Updated 5 years ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- Intel assembly finite field library generator☆13Nov 23, 2023Updated 2 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆26Sep 18, 2023Updated 2 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- NIST P-256 signatures for Cortex-M4 microcontrollers☆16Mar 14, 2021Updated 5 years ago
- Parallel programming library in C++11☆13Jan 2, 2020Updated 6 years ago
- A constant-time library for big integers modulo a prime, usable for cryptographic applications. Exported from crypto/internal/bigmod, the…☆14Jan 3, 2026Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆25Jul 29, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- WIP: code generation package in Go -- used by gnark, goff and gurvy☆14Feb 19, 2026Updated last month
- An authenticated data structure based on a red-black tree.☆54Jul 27, 2015Updated 10 years ago
- Rust binding for fastpbkdf2☆15Jun 29, 2025Updated 8 months ago
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- ☆15Nov 2, 2022Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A Reth Execution Extension (ExEx) with shared object (.so / .dylib) plugins☆16Oct 12, 2024Updated last year
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 9 months ago
- ☆10Aug 8, 2022Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Rust multihash implementation☆16Oct 1, 2020Updated 5 years ago